[go: up one dir, main page]

US20170099188A1 - Policy-driven switch overlay bypass in a hybrid cloud network environment - Google Patents

Policy-driven switch overlay bypass in a hybrid cloud network environment Download PDF

Info

Publication number
US20170099188A1
US20170099188A1 US14/876,627 US201514876627A US2017099188A1 US 20170099188 A1 US20170099188 A1 US 20170099188A1 US 201514876627 A US201514876627 A US 201514876627A US 2017099188 A1 US2017099188 A1 US 2017099188A1
Authority
US
United States
Prior art keywords
virtual machine
virtual
tunnel
direct tunnel
switch
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US14/876,627
Other versions
US11005682B2 (en
Inventor
David W. Chang
Abhijit Patra
Nagaraj A. Bagepalli
Dileep Kumar Devireddy
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Cisco Technology Inc
Original Assignee
Cisco Technology Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cisco Technology Inc filed Critical Cisco Technology Inc
Priority to US14/876,627 priority Critical patent/US11005682B2/en
Assigned to CISCO TECHNOLOGY, INC. reassignment CISCO TECHNOLOGY, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: DEVIREDDY, DILEEP KUMAR, BAGEPALLI, NAGARAJ A., CHANG, DAVID W., PATRA, ABHIJIT
Publication of US20170099188A1 publication Critical patent/US20170099188A1/en
Application granted granted Critical
Publication of US11005682B2 publication Critical patent/US11005682B2/en
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0893Assignment of logical groups to network elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4633Interconnection of networks using encapsulation techniques, e.g. tunneling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2101/00Indexing scheme associated with group H04L61/00
    • H04L2101/60Types of network addresses
    • H04L2101/618Details of network addresses
    • H04L2101/622Layer-2 addresses, e.g. medium access control [MAC] addresses
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0896Bandwidth or capacity management, i.e. automatically increasing or decreasing capacities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/12Discovery or management of network topologies
    • H04L41/122Discovery or management of network topologies of virtualised topologies, e.g. software-defined networks [SDN] or network function virtualisation [NFV]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/40Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using virtualisation of network functions or resources, e.g. SDN or NFV entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/09Mapping addresses
    • H04L61/10Mapping addresses of different types
    • H04L61/103Mapping addresses of different types across network layers, e.g. resolution of network layer into physical layer addresses or address resolution protocol [ARP]

Definitions

  • the subject matter of this disclosure relates in general to the field of computer networks, and more specifically for establishing policies to bypass a virtual switch overlay in a hybrid cloud network environment.
  • hybrid cloud architectures Industry trends indicate a growing movement among enterprises and other entities towards hybrid cloud architectures. These enterprises and other entities may be choosing such systems so that they can acquire additional on-demand computing, storage, and network resources, and eliminating the need to build for peak capacity within their own data centers.
  • a potential advantage of leveraging public clouds is that they may not have the same initial capital investments that may be necessary to build out a company's own private data center.
  • Another potential benefit for public cloud is that they may better absorb a company's need for elasticity by providing almost unlimited pay-as-you-grow expansion.
  • hybrid cloud designs can be conceptually and financially attractive, enterprises may be reluctant to place mission-critical applications in the public cloud because of a perception that migrating workloads from an on-premises network to a public network may significantly reduce control, security, and efficiency of enterprise applications.
  • FIG. 1 illustrates an example hybrid cloud network environment that can be utilized in an example embodiment
  • FIGS. 2A and 2B illustrate example approaches for distributing network traffic in a hybrid cloud environment that can be utilized in some example embodiments
  • FIG. 3 further illustrates an example approach for forwarding network traffic and enforcing security policy in a network environment similar to that of FIG. 2B ;
  • FIG. 4 illustrates an example data flow diagram for establishing communications between virtual machines in a hybrid cloud environment that can be utilized in an example embodiment
  • FIG. 5 illustrates an example data flow diagram for establishing communications between virtual machines in a hybrid cloud environment that can be utilized in another example embodiment
  • FIG. 6 an example hybrid cloud network environment that can be utilized in another example embodiment.
  • FIGS. 7A and 7B illustrate example systems that can be used in various example embodiments.
  • Network policies can be used to optimize the flow of network traffic between virtual machines (VMs) in a hybrid cloud environment.
  • one or more policies can drive a virtual switch controller, a hybrid cloud manager, a hypervisor manager, a virtual switch, or other orchestrator to create one or more direct tunnels that can be utilized by a respective pair of VMs to bypass the virtual switch and enable direct communication between the VMs.
  • the virtual switch can send the VMs network and security policies to ensure that these policies are enforced.
  • the VMs can exchange security credentials in order to establish the direct tunnel.
  • the direct tunnel can be used by the VMs to bypass the virtual switch and allow the VMs to communicate with each other directly.
  • a computer network is a geographically distributed collection of nodes interconnected by communication links and segments for transporting data between endpoints, such as personal computers and workstations.
  • endpoints such as personal computers and workstations.
  • Many types of networks are available, with the types ranging from Local Area Networks (LANs) and Wide Area Networks (WANs) to overlay networks and Software-Defined Networks (SDNs).
  • LANs Local Area Networks
  • WANs Wide Area Networks
  • SDNs Software-Defined Networks
  • LANs typically connect nodes over dedicated private communications links located in the same general physical location, such as a building or campus.
  • WANs typically connect geographically dispersed nodes over long-distance communications links, such as common carrier telephone lines, optical lightpaths, synchronous optical networks (SONET), or synchronous digital hierarchy (SDH) links.
  • LANs and WANs can include layer 2 (L2) and/or layer 3 (L3) networks and devices.
  • the Internet is an example of a WAN that connects disparate networks throughout the world, providing global communication between nodes on various networks.
  • the nodes typically communicate over the network by exchanging discrete frames or packets of data according to predefined protocols, such as the Transmission Control Protocol/Internet Protocol (TCP/IP).
  • TCP/IP Transmission Control Protocol/Internet Protocol
  • a protocol can refer to a set of rules defining how the nodes interact with each other.
  • Computer networks may be further interconnected by an intermediate network node, such as a router, to extend the effective size of each network.
  • Overlay networks generally allow virtual networks to be created and layered over a physical network infrastructure.
  • Overlay network protocols such as Virtual Extensible LAN (VXLAN), Network Virtualization using Generic Routing Encapsulation (NVGRE), Network Virtualization Overlays (NVO3), and Stateless Transport Tunneling (STT), can provide a traffic encapsulation scheme to allow network traffic to be carried across L2 and L3 networks over a logical tunnel.
  • VXLAN Virtual Extensible LAN
  • NVGRE Network Virtualization using Generic Routing Encapsulation
  • NVO3 Network Virtualization Overlays
  • STT Stateless Transport Tunneling
  • Overlay networks can also include virtual segments, such as VXLAN segments in a VXLAN overlay network, which can include virtual L2 and/or L3 overlay networks over which virtual machines (VMs) communicate.
  • the virtual segments can be identified through a virtual network identifier (VNI), such as a VXLAN network identifier, which can specifically identify an associated virtual segment or domain.
  • VNI virtual network identifier
  • Network virtualization allows hardware and software resources to be combined in a virtual network.
  • network virtualization can allow multiple numbers of VMs to be attached to the physical network via respective virtual LANs (VLANs).
  • VLANs virtual LANs
  • the VMs can be grouped according to their respective VLAN, and can communicate with other VMs as well as other devices on the internal or external network.
  • Cloud computing can also be provided in a network to provide computing services using shared resources.
  • Cloud computing can generally include Internet-based computing in which computing resources are dynamically provisioned and allocated to client or user computers or other devices on-demand, from a collection of resources available via the network (e.g., “the cloud”).
  • Cloud computing resources can include any type of resource, such as computing, storage, and networking, among others.
  • resources may include service devices (firewalls, deep packet inspectors, traffic monitors, load balancers, etc.), compute/processing devices (servers, CPUs, GPUs, random access memory, caches, etc.), and storage devices (e.g., network attached storages, storage area network devices, hard disk drives, solid-state devices, etc.), among others.
  • such resources may be used to support virtual networks, VMs, databases, applications (“apps”), etc.
  • Cloud computing resources may include a “private cloud,” a “public cloud,” and/or a “hybrid cloud.”
  • a “private cloud” can be a cloud infrastructure operated by an enterprise for use by the enterprise, while a “public cloud” can be a cloud infrastructure that provides services and resources over a network for public use.
  • a “hybrid cloud” can be a cloud infrastructure composed of two or more clouds that inter-operate or federate through cloud orchestration, cloud management, cloud automation, or similar technologies.
  • a hybrid cloud can be thought of as an interaction between private and public clouds where a private cloud joins a public cloud and utilizes public cloud resources in a secure and scalable manner.
  • FIG. 1 illustrates an example hybrid cloud network environment 100 that can be utilized in an example embodiment.
  • Hybrid cloud network environment 100 can include a plurality of networks or clouds, such as a private cloud 102 (e.g., an enterprise virtual datacenter) and a public cloud 104 separated by a WAN 106 , such as the Internet.
  • a hybrid cloud is sometimes defined as consisting of a private cloud and a public cloud, it should be understood that many aspects of this disclosure can be practiced in various configurations (e.g., two or more public clouds hosted by third party cloud providers and/or two or more private clouds of an enterprise located in different locations).
  • the private cloud 102 and the public cloud 104 can be integrated using overlay network techniques, such as VXLAN, NVGRE, NVO3, STT, or other overlay network protocols known to those of ordinary skill.
  • the private cloud 102 and public cloud 104 can be connected via a site-to-site tunnel or communication link 108 between a private cloud network gateway 110 and a public cloud network gateway 112 .
  • the private cloud network gateway 110 can be configured as a VM for extending the private cloud across the Internet to the public cloud 104 through the site-to-site tunnel 108 .
  • the public cloud network gateway 112 can be configured as a VM switch overlay for interconnecting workloads running in the public cloud 104 via secure access tunnels, and for forwarding network traffic to the private network 102 using the site-to-site tunnel 108 .
  • the private cloud network gateway 110 can be implemented using Intercloud FabricTM Extender (ICX) from Cisco®, Systems, Inc. of San Jose, Calif.
  • the public cloud network gateway 112 can be implemented using Intercloud FabricTM Switch (ICS) from Cisco®, and the ICX/ICS pair can form an Intercloud FabricTM Cloud (ICFCloud).
  • ICX Intercloud FabricTM Extender
  • ICS Intercloud FabricTM Switch
  • the private cloud network gateway 110 can establish, from the private cloud 102 , the secure site-to-site tunnel 108 to interconnect with the public cloud network gateway 112 , and interact with a virtual switch controller or Virtual Supervisor Module (VSM) 114 .
  • VSM Virtual Supervisor Module
  • the VSM 114 can serve as a network controller for managing the network and security policies of the overlay network.
  • the VSM 114 can be implemented in an active-standby model to ensure high availability, with a first VSM functioning in a primary role and a second VSM functioning in a secondary role. If the first VSM fails, the second VSM can take over control.
  • a virtual chassis model can be used to represent VSM 114 and each virtual switch or Virtual Ethernet Module (VEM) under the VSM's control or within the VSM's domain, such as VEM 116 a in the private cloud and public cloud VEM 116 b .
  • VEM Virtual Ethernet Module
  • the high availability pair of VSMs 114 can be associated with slot numbers 1 and 2 in the virtual chassis, and the VEMs 116 a and 116 b can be sequentially assigned to the remaining slots.
  • VSM 114 may be configured to provide control plane functionality for the virtual switches or VEMs 116 a and 116 b .
  • the VEMs 116 a and 116 b can provide network connectivity and switching capability for VMs hosted on a corresponding server like a line card in a modular switching platform, and can operate as part of a data plane associated with the control plane of VSM 114 . Unlike multiple line cards in a single chassis, each VEM can act as an independent switch from a forwarding perspective. In some example embodiments, the VEMs 116 a and 116 b may form a distributed virtual switch that can be controlled by the VSM 114 . In an example embodiment, the VSM 114 and VEMs 116 a and 116 b can be implemented using Cisco Nexus® 1000V Series Switches.
  • the private cloud 102 can also include a hybrid cloud manager 120 , which can be a management plane VM for auto-provisioning resources within the hybrid cloud network environment 100 .
  • the hybrid cloud manager 120 can be a management platform running in the private cloud 102 , and may be responsible for providing hybrid cloud operations, translating between private cloud and public cloud interfaces, managing cloud resources, instantiating cloud gateways and cloud VMs though a private virtualization platform or hypervisor manager 122 and public cloud provider application programming interfaces (APIs).
  • APIs application programming interfaces
  • the hybrid cloud manager 120 may also monitor the health of all of the components of the network (e.g., cloud gateways, VMs, and communication links) and ensure high availability of those components.
  • the hybrid cloud manager 120 can be implemented as a virtual appliance, such as the Intercloud FabricTM Director (ICFD) from Cisco®.
  • ICFD Intercloud FabricTM Director
  • the ICFD can be a hybrid cloud orchestration component that can provide a single point of management and consumption of hybrid cloud resources. That is, the ICFD can offer a single console so that users can provision workloads and associated policies.
  • the ICFD can also expose northbound APIs, which allow users to programmatically manage their workloads in the hybrid cloud environment 100 or integrate with other cloud management platforms.
  • the private cloud 102 can include one or more physical servers 124 that each deploy a hypervisor 126 (also sometimes referred to as a virtual machine manager or a virtual machine monitor (VMM)).
  • the hypervisor 126 may be computer software, firmware, or hardware that creates and runs one or more VMs, such as VMs 128 or cVMs 118 .
  • VMs may or may not be managed by a hypervisor.
  • the hypervisor 126 can provide a respective operating system to one or more VMs.
  • the hypervisor 126 may be a native or “bare metal” hypervisor that runs directly on hardware, but that may alternatively run under host software executing on hardware.
  • the hypervisor 126 can be managed by the virtualization platform or hypervisor manager 122 , such as vSphere® from VMware®, Inc. of Palo Alto, Calif., Hyper-V® from Microsoft® Corp. of Seattle, Wash., XenServer® from Citrix® Systems, Inc. of Santa Clara, Calif., or Red Hat® Enterprise Virtualization from Red Hat®, Inc. of Raleigh, N.C.
  • Each VM can host a private application.
  • each public cloud VM 118 may be connected to the public cloud network gateway 112 via secure access tunnels, as discussed elsewhere herein.
  • one or more cVMs 118 can be configured to operate as a public cloud firewall (not shown), such as an Intercloud FabricTM Firewall or Virtual Security Gateway (VSG) from Cisco®.
  • one or more cVMs 118 can be configured to operate as a public cloud router (not shown), such as an Intercloud FabricTM Router or Cloud Services Router (CSR) from Cisco®.
  • CSR Cloud Services Router
  • the public cloud network gateway 112 can establish, from the public cloud 104 , the secure site-to-site tunnel 108 to interconnect with the private cloud network gateway 110 , secure access tunnels to connect public cloud VMs (cVMs) 118 , and monitor and report statistics for the public cloud VMs and any component failures in the public cloud 104 .
  • the private cloud network gateway 110 and the public cloud network gateway 112 can be deployed as a high-availability pair to provide redundancy.
  • the public cloud network gateway 112 can include a cloud virtual switch or cloud Virtual Ethernet Module (cVEM) 116 b that communicates with the VSM 114 to retrieve VM-specific network policies (e.g., port profiles), switches network traffic between public cloud VMs 118 , switches network traffic between public cloud VMs and the private cloud 102 , applies network policies, and monitors and reports VEM-related statistics.
  • cVEM cloud virtual switch or cloud Virtual Ethernet Module
  • each physical server such as physical server 124 , hosting a VM, including VM 128 and cVM 118 , can include multiple Virtual Network Interface Cards (VNICs) (not shown) for providing specific functionality, such as control and/or data/packet transmission.
  • VNICs Virtual Network Interface Cards
  • a VM on a physical server can include a vNIC that may be connected to a VEM, such as VEM 116 a or cVEM 116 b , for connecting the VM or cVM to the network.
  • Each physical server 124 can include a vNIC for enabling control functionality, such as Small Computer Systems Interface over IP (iSCSI), Network File System (NFS) access, migration of VMs or cVMs, directly connected tunnels, discussed elsewhere herein, as well as other control functionality.
  • control functionality such as Small Computer Systems Interface over IP (iSCSI), Network File System (NFS) access, migration of VMs or cVMs, directly connected tunnels, discussed elsewhere herein, as well as other control functionality.
  • each public cloud VM 118 can include an agent (not shown) that provides for the network overlay logic for the public cloud VM.
  • the agent can be deployed in the cVM as a secure tunnel driver.
  • the agent can establish a secure access tunnel to connect the public cloud VM 118 to the public cloud network gateway 112 , and monitor and report secure overlay-related statistics.
  • the agent can be implemented using Intercloud FabricTM Agent (ICA) from Cisco®.
  • ICA Intercloud FabricTM Agent
  • the secure site-to-site tunnel or communication link 108 can take one of several forms, such as various types of virtual private networks (VPNs) or Layer 2 (L2) tunneling protocols.
  • VPNs virtual private networks
  • L2 Layer 2
  • some example embodiments may utilize an open VPN (e.g., OpenVPN) overlay or an IP Security (IPSec) VPN based L3 network extension to provide the communication link 108 .
  • Some example embodiments may utilize a secure transport layer (i.e., L4) tunnel as the communication link 108 between the private cloud network gateway 110 and the public cloud network gateway 112 , where the secure transport layer tunnel 108 can be configured to provide a link layer (i.e., L2) network extension between the private cloud 102 and the public cloud 104 .
  • L4 secure transport layer
  • Some example embodiments may establish the secure transport layer (i.e., L4) tunnel 108 (e.g., Transport Layer Security (TLS), Datagram TLS (DTLS), Secure Socket Layer (SSL), etc.) over the public network 104 , and can build a secure L2 switch overlay that interconnects public cloud resources with private clouds (e.g., enterprise network backbones).
  • L4 tunnel 108 can provide a link layer network extension between the private cloud 102 and the public cloud 104 .
  • the private cloud network gateway 110 can use an L4 secure tunnel as the communication link 108 to connect to the cloud resources allocated in the public cloud 104 .
  • the L4 secure tunnel may be well-suited for use with corporate firewalls and Network Address Translation (NAT) devices due to the nature of the transport level protocols (e.g., UDP/TCP) and the transport layer ports opened for HTTP/HTTPS in the firewall.
  • NAT Network Address Translation
  • the L2 network can thus be further extended and connected to each of the cloud VMs 118 through the public cloud network gateway 112 .
  • instances of a particular private application VM can be seamlessly migrated to the overlay network dynamically created in the public cloud 104 , without substantial impact to existing corporate infrastructure.
  • FIGS. 2A and 2B illustrate example approaches for distributing VM-to-VM network traffic in a public cloud 204 of a hybrid cloud network that can be utilized in some example embodiments.
  • the public cloud environment 204 can include a public cloud network gateway 212 and public cloud VMs 218 a , 218 b , 218 c , and 218 d .
  • a cloud manager e.g., cloud manager 120 of FIG. 1
  • the cloud manager can interface with a hypervisor manager (e.g., hypervisor manager 122 of FIG. 1 ) (not shown) to instantiate a VM (e.g., VM 128 of FIG. 1 ) (not shown) in the private cloud and configure the VM to operate as a private cloud network gateway (e.g., private cloud network gateway 110 of FIG. 1 ) (not shown).
  • the cloud manager can also interface with a hypervisor manager in the public cloud 204 or cloud provider APIs to instantiate a plurality of public cloud VMs (e.g., cVMs 218 a , 218 b , 218 c , or 218 d ).
  • One or more of the cVMs can be configured to operate as the public cloud network gateway 212 .
  • One or more of the cVMs can be configured to operate as a public cloud firewall (not shown).
  • One or more of the cVMs can be configured to operate as a public cloud router (not shown).
  • One or more of the cVMs can be configured for migrating workloads from the private cloud to the public cloud 204 .
  • the cloud manager can also establish a site-to-site tunnel or secure network extension 208 between the private cloud network gateway and the public cloud network gateway 212 .
  • a public cloud VM agent 230 can be utilized to provide a compute environment and network overlay for the public cloud VMs 218 a , 218 b , 218 c , and 218 d .
  • the cVMA 230 can be deployed in a public cloud VM as a secure tunnel driver that runs within the public cloud VM's operating system.
  • the agent 230 can cause a cVM to direct network traffic to the secure overlay network by establishing a secure tunnel (e.g., access tunnels 232 a and 232 b ) to connect to the public cloud network gateway 212 for allowing the cVMs to communicate with private cloud VMs and other public cloud VMs.
  • the cVMA 230 can also collect secure overlay-related statistics.
  • the access tunnel 232 a can be used for secure communications between cVM 218 a and 218 d
  • the access tunnel 232 b can be used for secure communications between public cloud VM 218 b and public cloud VM 218 c
  • the public cloud VM 218 a desires to send a packet to the public cloud VM 218 d
  • the packet can first be sent to the public cloud network gateway 212 , where network and security policy may be enforced.
  • the public cloud network gateway 212 may forward the packet to the cVM 218 d . That is, packets sent between cVMs 218 a and cVM 218 d may pass through the public cloud network gateway 212 before arriving at the packets' intended destinations.
  • FIG. 2B illustrates an example approach.
  • a direct connection or Directly Connected Tunnel (DCT) 234 a may be established between cVM 218 a and cVM 218 d
  • a direction connection or DCT 234 b may be established between cVM 218 b and 218 c .
  • DCT Directly Connected Tunnel
  • Network traffic between cVMs 218 a and 218 d can bypass the public cloud network gateway 212 by transmitting the traffic through the directly connected tunnel 234 a .
  • communications between cVMs 218 b and 218 c can bypass the public cloud network gateway 212 by sending the communications over the directly connected tunnel 234 b.
  • a direct connection or DCT can refer to a direct connection from an overlay network perspective rather than a direct physical connection.
  • cVMs 218 a and 218 d may not be directly connected to a same Ethernet (L2) hub, but can achieve L2 adjacency via VXLAN, NVGRE, NVO3, STT, or other suitable overlay network protocol.
  • access tunnel 232 a may be referred to as an indirect tunnel because traffic between cVMs 218 a and 218 d includes a hop over the public cloud network gateway 212 .
  • DCT 234 a can be referred to as a direct tunnel because it does not include such hop.
  • DCTs can reduce bandwidth requirements of the public cloud network gateway 212 and minimize the chances of the public cloud network gateway becoming a bottleneck for the hybrid cloud network, bypassing the public cloud network gateway may also result in network and security policy becoming unenforced.
  • FIG. 3 further illustrates an example approach for forwarding network traffic and enforcing security policy in a network environment similar to that of FIG. 2B .
  • the public cloud environment 304 can include a public cloud network gateway 312 interconnected with public cloud VMs 318 a and 318 b .
  • the cVM 318 a can be assigned IP address 10 . 10 . 10 . 10 and MAC address aa.aa.aa
  • the cVM 318 b can be assigned IP address 20 . 20 . 20 . 20 and MAC address bb.bb.bb.
  • the cVMs 318 a and 318 b may be indirectly connected via a secure access tunnel 332 .
  • traffic between these cVMs transmitted along the access tunnel at one endpoint of the access tunnel can include a hop over the public cloud network gateway 312 before arriving at the other end of the access tunnel.
  • the secure access tunnel 332 can be associated with tunnel identifier 1 .
  • the cVMs 318 a and 318 b may also be directly connected via a direct connection or DCT 334 .
  • the DCT 334 can be associated with tunnel identifier 2 .
  • the cVMs 318 a and 318 b can communicate with each other through the secure access tunnel 332 (and through the public cloud network gateway 312 ).
  • the public cloud network gateway 312 can establish the access tunnel 332 as a default access tunnel during the initial deployment of a cVM and have network traffic between cVMs pass through the public cloud network gateway as a default forwarding policy.
  • cVM 318 a 's egress forwarding table 336 can be initialized to include an entry of “*” or all addresses for the destination IP address, “*” or all addresses for the destination MAC address, and a tunnel identifier of 1 to indicate that cVM 318 's egress traffic should be forwarded on the default access tunnel 1 , i.e., forwarded to the public cloud network gateway 312 .
  • the cVM 318 b can have a similar egress forwarding table including a similar default forwarding policy. In the example embodiment of FIG.
  • the cVM 318 b may have a default security policy or Access Control List (ACL) that denies all incoming traffic, which can be represented in the cVM 318 b 's ingress security policy table 338 as an entry including “*” or all addresses for the source address, “*” or all tunnels for the tunnel identifier, and a “Deny” rule for dropping incoming traffic corresponding to the source address and source tunnel.
  • ACL Access Control List
  • the cVM 318 a may include a similar ingress security policy table with a default security policy or ACL.
  • policies can be defined for connecting a first cVM to a second cVM via a DCT.
  • a DCT policy can be on-demand or enforced when any cVM mutually connected to a same public cloud network gateway attempt to communicate with one another.
  • the public cloud network gateway can be configured to orchestrate the creation of a DCT tunnel between a pair of cVMs based on an initial attempted cVM-to-cVM communication via a secure access tunnel, such as an Address Resolution Protocol (ARP) request.
  • ARP Address Resolution Protocol
  • a DCT policy can be application-driven or enforced by a cloud orchestration component (e.g., the VSM 114 of FIG.
  • the management interface can be utilized to configure a public cloud network gateway to set up one or more DCTs among a set of cVMs connected to the gateway based on the application network profiles or requirements.
  • a DCT policy can be statistics-driven or enforced according to metrics relating to the hybrid cloud network.
  • a cVM agent and/or public cloud network gateway can monitor latency, bandwidth, throughput, response time, or other suitable processing and/or network performance measurement until such measurement is below a threshold, above a threshold, or otherwise satisfies a threshold condition.
  • the public cloud network gateway can establish one or more DCTs to address the threshold condition.
  • a public cloud network gateway can be configured to create DCTs on-demand once CPU utilization reaches an upper bound and can revert to a previous network policy when CPU utilization is below a lower bound.
  • a cVM agent can monitor and report network latency to a VSM (e.g., the VSM 114 of FIG. 1 ), cloud manager (e.g., cloud manager 120 of FIG. 1 ), hypervisor manager (e.g., hypervisor manager 122 of FIG. 1 ), or other suitable management interface.
  • VSM e.g., the VSM 114 of FIG. 1
  • cloud manager e.g., cloud manager 120 of FIG. 1
  • hypervisor manager e.g., hypervisor manager 122 of FIG. 1
  • the management interface can direct the public cloud network gateway to establish one or more DCTs for that cVM to alleviate the network latency.
  • other policies can be defined for establishing DCTs as would be known to one of ordinary skill in the art.
  • the public cloud network gateway 312 can send network address information and security information (e.g., keys credentials, certificates, or other authentication information) 340 relating to cVM 318 b to the cVM 318 a over the secure access tunnel 332 .
  • This can cause the egress forwarding policy table 336 to be updated with an entry, such as “ 20 . 20 . 20 . 20 ” for the destination IP address, “bb.bb.bb” for the destination MAC address, and tunnel identifier 2 , indicating that traffic intended for the cVM 318 b sent by the cVM 318 a should be delivered over direct tunnel 334 .
  • the public cloud network gateway 312 can also send security policy information 342 to ensure applicable security policies are enforced.
  • the security policy information 342 can cause the ingress security policy table 338 to be populated with an entry comprising “ 10 . 10 . 10 . 10 ” for a source address, tunnel identifier 2 , and an “Allow” rule, which indicates that traffic originating from the source address sent over the DCT 334 can be accepted by the cVM 318 b .
  • physical servers hosting cVMs 318 a and 318 b can include control interfaces that can be used to form a control tunnel 344 between cVMs 318 a and 318 b .
  • the first cVM's address and security information 340 and the second cVM's security policy information 342 can be sent over the control tunnel 344 . In another example embodiment, such information can be sent over the secure access tunnel 332 .
  • FIG. 4 illustrates an example data flow diagram 400 for establishing communications between VMs in a hybrid cloud environment that can be utilized in an example embodiment.
  • Data flow diagram 400 may be used for enforcing an on-demand DCT policy, such as when a network is configured to establish a DCT tunnel upon any attempted communication between cVMs connected to the gateway, or the network has defined a statistics-driven DCT policy and a threshold condition corresponding to the policy is satisfied.
  • a first VM 418 a and a second VM 418 b are each connected to a virtual switch or public cloud network gateway 412 .
  • a secure access tunnel 432 can be established between the cVMs during their deployment.
  • the access tunnel 432 can include a hop over the public cloud network gateway 412 .
  • the cVM 418 a 's forwarding table (e.g., egress forwarding policy table 336 of FIG. 3 ) can be initialized with a default rule to send egress traffic to the public cloud network gateway 412 over the access tunnel 432 .
  • the cVM 418 b 's forwarding table may include a similar entry.
  • the respective physical servers hosting cVMs 418 a and 418 b may include respective control interfaces such that a control tunnel 444 can also be created between cVMs 418 a and 418 b.
  • the first cVM 418 a can attempt to communicate with the second cVM 418 b , and may begin at 402 by sending an ARP request to the virtual switch or public cloud network gateway 412 to determine network address information for the second cVM.
  • the ARP request can be sent over the secure access tunnel 432 based on the first cVM's default forwarding rule.
  • the virtual switch or public cloud network gateway 412 can resolve the requested network address information such as by looking up the requested network address in the switch's ARP cache to identify the MAC address of the second cVM 418 b .
  • the switch 412 can also retrieve the second cVM's security information, such as keys, credentials, certificates, or other information necessary for establishing a DCT with the second cVM 418 b .
  • Keys, credentials, or certificates can include passwords, private keys generated from public-key cryptography methods (e.g., Rivest-Shamir-Adleman (RSA), Digital Signature Algorithm (DSA), Elliptical Curve Digital Signature Algorithm (ECDSA), Diffie-Helman (DH), Elliptic Curve Diffie-Hellman (ECDH)), or secret keys generated from symmetric-key cryptography methods (e.g., International Data Encryption Algorithm (IDEA), Data Encryption Standard (DES), Triple-DES, Advanced Encryption Standard (AES), ARCFOUR (RC4), Blowfish, Twofish, Carlisle Adams Stafford Tavares (CAST), etc.
  • RSA Rivest-Shamir-Adleman
  • DSA Digital Signature Algori
  • the switch 412 can send the ARP reply to the first cVM 418 a over the default tunnel 432 .
  • the DCT configuration information can be piggybacked onto the ARP reply.
  • the virtual switch 412 can also fetch the security policy rules relevant to the second cVM 418 b and may send the security policies to the second cVM's control interface at 406 .
  • the first cVM can begin the DCT establishment process or protocol by sending a DCT connection request to the second cVM 418 b over the control tunnel 444 .
  • the DCT connection request can include information for authenticating the first cVM 418 a derived from the second cVM's security information, as well as keys, credentials, certificates, or other information necessary to establish a DCT with the first cVM.
  • the second cVM 418 b may attempt to authenticate the first cVM using the first cVM's authentication information within the DCT connection request.
  • the second cVM 418 b can establish itself as one endpoint of the DCT 434 , such as by updating its ingress security policy table using the received security policies.
  • the second cVM 418 b may then send a DCT connection reply that includes information authenticating the second cVM with information derived from the first cVM's security information.
  • the second cVM 418 b may also update its egress forwarding table with an entry for forwarding egress traffic to the first cVM 418 a through the DCT 434 .
  • the first cVM may attempt to authenticate the second cVM 418 b using the second cVM's authentication information within the DCT connection reply. If the second cVM 418 b is authenticated, the first cVM 418 a may establish itself as the other endpoint of the DCT 434 , such as by updating its egress forwarding policy table with an entry forwarding traffic to the second cVM through the DCT.
  • the first cVM 418 a may subsequently send its application traffic directly to the second cVM 418 b via the DCT 434 at 414
  • the second cVM 418 b can send its application traffic directly to the first cVM 418 a via the DCT 434 at 416 .
  • FIG. 5 illustrates an example data flow diagram 500 for establishing communications between VMs in a hybrid cloud environment that can be utilized in another example embodiment.
  • Data flow diagram 500 may be used for enforcing an application-driven DCT policy. For instance, instead of being acted upon according to real-time cVM-to-cVM traffic, such as in the case with an on-demand or statistics-driven DCT policy, an application-driven policy may be based on ANPs or application network requirements. Thus, it may be required to have prior knowledge of the application-level network topology and security requirements of an application before its deployment.
  • Another difference between data flow diagrams 400 and 500 may lie in the first few steps of each process. That is 502 and 504 of the data flow diagram 500 may differ from 402 and 404 of the data flow diagram 400 but 506 through 516 of the data flow diagram 500 may be the same or substantially similar to 406 through 416 of the data flow diagram 400 .
  • the data flow diagram 500 may begin by defining an ANP based on prior knowledge of the application's network and security requirements.
  • the ANP can include configuration of endpoints (e.g., network and security policies) and security information (e.g., keys, credentials, certificates, or other authentication information.
  • a cloud orchestration component 546 e.g., the VSM 114 of FIG. 1 , cloud manager 120 of FIG. 1 , hypervisor manager 122 of FIG. 1 , or other management interface
  • the ANP can be sent through a secure access tunnel.
  • the virtual switch 512 can build one or more DCT tunnels 534 between various VM pairs (e.g., cVMs 518 a and 518 b ) one-by-one until each application node, configured to bypass the virtual switch according to the ANP, is connected to a DCT.
  • the virtual switch 512 can send DCT configuration to one or more cVMs over the control tunnel 544 .
  • the DCT configuration information can be sent over a secure access tunnel.
  • 506 through 516 can be the same or substantially the same as 406 through 416 of FIG. 4 .
  • FIG. 6 illustrates an example hybrid cloud network environment 600 that can be utilized in another example embodiment.
  • the hybrid cloud network environment 600 can include a private cloud (e.g., private cloud 102 of FIG. 1 ) (not shown) interconnected to a public cloud 604 via a secure network extension or site-to-site tunnel 608 .
  • the public cloud 604 can comprise a plurality of hosts, such as a web host 648 , an application host 650 , and a database host 652 . Each host can be implemented as a virtual machine or a bare metal host.
  • the web host 648 can include a public cloud network gateway 612 a that interconnects the host to the private cloud by the secure site-to-site tunnel 608 .
  • the public cloud network gateway 612 a can also interconnect the web host 648 to the application host 650 by a secure inter-gateway tunnel 654 a.
  • the web host 648 can also include web containers 656 a and 656 b .
  • the public cloud network gateway 612 a can also be implemented as a container.
  • a container is a kind of lightweight virtual machine utilized in operating system level virtualization.
  • Operating system level virtualization is a type of server virtualization in which the kernel of an operating system may be capable of providing multiple isolated user space instances or containers. Unlike whole system server virtualization, in which a single server can host multiple operating systems, operating system level virtualization can be used to partition a single operating system among multiple containers. Containers may use less memory and CPU than whole system VMs running similar workloads because only a single kernel may be executed using containers whereas multiple kernels may be executed using whole system VMs. However, containers can raise security concerns not applicable to whole system VMs due to operating system resources being shared.
  • the application host 650 can include a public cloud network gateway 612 b and application containers 656 c and 656 d .
  • the public cloud network gateway 612 b can be used to interconnect the application host 650 to the web host 648 via the secure inter-gateway tunnel 654 a , and the application host 650 to the database host 652 via the secure inter-gateway tunnel 654 b .
  • the database host 652 can include a public cloud network gateway 612 c and database container 656 e . As illustrated in FIG.
  • the public cloud 604 can be used to implement a conventional multi-tier or three-tier architecture including a web or presentation tier corresponding to the web host 648 , an application or logic tier corresponding to the application host 650 , and a data or database tier corresponding to the database host 652 .
  • one or more application-driven DCT policies can be applied to the public cloud network 604 to create the multi-tier application architecture and the secure inter-gateway tunnels 654 a and 654 b .
  • the public cloud network gateways can provide default network connectivity to every container (e.g., via access tunnels) while optimizing network traffic flow by using the DCTs as a primary data path for exchanging application traffic.
  • FIG. 7A illustrates an example embodiment of a physical server 724 , such as physical server 124 of FIG. 1 .
  • the physical server 724 can include hardware 758 , a hypervisor 726 (e.g., hypervisor 126 of FIG. 1 ), and a public cloud virtual machine 718 (e.g., cVM 118 of FIG. 1 ).
  • Hardware 758 can represent any machine or apparatus capable of accepting, performing logic operations on, storing, or displaying data, and may include a processor 760 and memory 762 .
  • a cVM agent 730 e.g., cVM agent 230 of FIG. 2
  • the cVM agent 730 can include software, such as a network overlay module 764 and a DCT protocol module 766 .
  • the network overlay module 764 can be used to provide a compute environment and network overlay for the cVM 718 , and can include logic for establishing a secure tunnel (e.g., access tunnel 332 of FIG. 3 ) to connect the cVM 718 to a public cloud network gateway (not shown).
  • the DCT protocol module 766 can include logic for performing the DCT protocol or process discussed with respect to FIGS. 4 and 5 .
  • the memory 762 can be used to store an egress forwarding policy table, such as egress forwarding policy table 336 of FIG. 3 , and an ingress security policy table, such as ingress security policy table 338 of FIG. 3 .
  • FIG. 7B illustrates an example embodiment of a public cloud network gateway 712 , such as the public cloud network gateway 112 of FIG. 1 .
  • the public cloud network gateway 712 can include hardware 768 and public cloud network gateway software, such as an Input/Output (I/O) interface 770 and a DCT protocol module 772 .
  • I/O interface 770 can enable the public cloud network gateway 712 to communicate with components located within the same public cloud as the gateway, as well as with other public cloud network gateways and with a private cloud (e.g., private cloud 102 of FIG. 1 ) (not shown).
  • I/O interface 770 can enable the public cloud network gateway 712 to communicate with components located within the same public cloud as the gateway, as well as with other public cloud network gateways and with a private cloud (e.g., private cloud 102 of FIG. 1 ) (not shown).
  • I/O interface 770 can include a site-to-site tunnel interface 774 , an inter-gateway tunnel interface 776 , and an access tunnel interface 778 .
  • Site-to-site tunnel interface 774 can be used by the public cloud network gateway 712 to communicate with a private cloud network gateway (e.g., private cloud network gateway 110 of FIG. 1 ) (not shown) over a secure site-to-site tunnel, such as secure site-to-site tunnel 108 of FIG. 1 .
  • Inter-gateway tunnel interface 776 can be used by the public cloud network gateway 712 to communicate with other public cloud network gateways over inter-gateway tunnels, such as inter-gateway tunnels 654 a and 654 b of FIG. 6 .
  • Access tunnel interface 778 can be used by the public cloud network gateway 712 to communicate with cVMs (e.g., cVM 718 ) over secure access tunnels, such as access tunnel 332 of FIG. 3 or over an overlay network, such as a VXLAN, NVGRE, NVO3, STT, or other overlay network.
  • cVMs e.g., cVM 718
  • an overlay network such as a VXLAN, NVGRE, NVO3, STT, or other overlay network.
  • the DCT protocol module 772 can include logic for performing the DCT protocol or process discussed with respect to FIGS. 4 and 5 .
  • Hardware 768 can represent any machine or apparatus that is capable of accepting, performing logic operations on, storing, or displaying data, and may include a processor 780 and memory 782 .
  • Memory 782 can include, for example, a hash map, table, or other suitable data structure for storing the network address information of cVMs in the public cloud, such as an ARP cache, a cVM MAC address-to-VEM IP address mapping, a forwarding table, or other network address data structure.
  • Memory 782 can also include a database or other suitable data structure for storing DCT configuration information, including security policies and security information (e.g., keys, credentials, certificates, or other authentication information) for each cVM attached to the public cloud network gateway 712 .
  • Memory 782 can further include one or more tables, lists, or other data structures for storing data associated with certain operations described herein.
  • the public cloud network gateway 712 , physical server 724 , and/or physical switches connected to these components can be network elements, which can encompass network appliances, servers, routers, switches, firewalls gateways, bridges, load balancers, modules, or any other suitable device, proprietary component, element, or object operable to exchange information in a network environment.
  • Network elements may include any suitable hardware, software, components, modules, or objects that facilitate the operations thereof, as well as suitable interfaces for receiving, transmitting, and/or otherwise communicating data or information in a network environment. This may be inclusive of appropriate algorithms and communication protocols that allow for the effective exchange of data or information.
  • each of the public cloud network gateway 712 , physical server 724 , and/or a physical switches connected to these components can include memory elements for storing information to be used in the operations disclosed herein.
  • physical server 724 may also include virtual memory elements for storing information associated with virtual partitions, such as public cloud virtual machine 718 .
  • Each of VSM 702 , virtualized system 706 , VEM 714 , and/or a connected physical switch may keep information in any suitable memory element (e.g., random access memory (RAM), read-only memory (ROM), erasable programmable ROM (EPROM), electrically erasable programmable ROM (EEPROM), application specific integrated circuit (ASIC), etc.), software, hardware, or in any other suitable component, device, element, or object where appropriate and based on particular needs. Any of the memory elements discussed herein (e.g., memory 762 and 782 ) should be construed as being encompassed within the broad term memory element or memory.
  • RAM random access memory
  • ROM read-only memory
  • EPROM erasable programmable ROM
  • EEPROM electrically erasable programmable ROM
  • ASIC application specific integrated circuit
  • Information being used, tracked, sent, or received by each of the public cloud network gateway 712 , physical server 724 , and/or a connected physical switch can be provided in any database, register, queue, table, cache, control list, or other storage structure, all of which can be referenced at any suitable timeframe. Any such storage options may be included within the broad term memory element or memory as used herein.
  • each of the public cloud network gateway 712 , physical server 724 , and/or a connected physical switch may include software modules (e.g., DCT protocol) to achieve, or to foster operations as outlined herein.
  • software modules e.g., DCT protocol
  • such operations may be carried out by hardware, implemented externally to these elements, or included in some other network device to achieve the intended functionality.
  • these elements may include software (or reciprocating software) that can coordinate in order to achieve the operations, as outlined herein.
  • one or all of these devices may include any suitable algorithms, hardware, software, components, modules, interfaces, or objects that facilitate the operations thereof.
  • the optimization and/or switch overlay bypass functions outlined herein may be implemented by logic encoded in one or more tangible, non-transitory media (e.g., embedded logic provided in an application specific integrated circuit (ASIC), digital signal processor (DSP) instructions, software (potentially inclusive of object code and source code) to be executed by a processor, or other similar machine, etc.).
  • the computer-readable storage devices, mediums, and memories can include a cable or wireless signal containing a bit stream and the like.
  • non-transitory computer-readable storage media expressly exclude media such as energy, carrier signals, electromagnetic waves, and signals per se.
  • Such instructions can comprise, for example, instructions and data which cause or otherwise configure a general purpose computer, special purpose computer, or special purpose processing device to perform a certain function or group of functions. Portions of computer resources used can be accessible over a network.
  • the computer executable instructions may be, for example, binaries, intermediate format instructions such as assembly language, firmware, or source code. Examples of computer-readable media that may be used to store instructions, information used, and/or information created during methods according to described examples include magnetic or optical disks, flash memory, USB devices provided with non-volatile memory, networked storage devices, and so on.
  • Devices implementing methods according to the subject matter of this disclosure can comprise hardware, firmware and/or software, and can take any of a variety of form factors. Typical examples of such form factors include laptops, smart phones, small form factor personal computers, personal digital assistants, and so on. Functionality described herein also can be embodied in peripherals or add-in cards. Such functionality can also be implemented on a circuit board among different chips or different processes executing in a single device, by way of further example.
  • the instructions, media for conveying such instructions, computing resources for executing them, and other structures for supporting such computing resources are means for providing the functions described in these disclosures.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

Network policies can be used to optimize the flow of network traffic between virtual machines (VMs) in a hybrid cloud environment. In an example embodiment, one or more policies can drive a virtual switch controller, a hybrid cloud manager, a hypervisor manager, a virtual switch, or other orchestrator to create one or more direct tunnels that can be utilized by a respective pair of VMs to bypass the virtual switch and enable direct communication between the VMs. The virtual switch can send the VMs network and security policies to ensure that these policies are enforced. The VMs can exchange security credentials in order to establish the direct tunnel. The direct tunnel can be used by the VMs to bypass the virtual switch and allow the VMs to communicate with each other directly.

Description

    TECHNICAL FIELD
  • The subject matter of this disclosure relates in general to the field of computer networks, and more specifically for establishing policies to bypass a virtual switch overlay in a hybrid cloud network environment.
  • BACKGROUND
  • Industry trends indicate a growing movement among enterprises and other entities towards hybrid cloud architectures. These enterprises and other entities may be choosing such systems so that they can acquire additional on-demand computing, storage, and network resources, and eliminating the need to build for peak capacity within their own data centers. A potential advantage of leveraging public clouds is that they may not have the same initial capital investments that may be necessary to build out a company's own private data center. Another potential benefit for public cloud is that they may better absorb a company's need for elasticity by providing almost unlimited pay-as-you-grow expansion. Although hybrid cloud designs can be conceptually and financially attractive, enterprises may be reluctant to place mission-critical applications in the public cloud because of a perception that migrating workloads from an on-premises network to a public network may significantly reduce control, security, and efficiency of enterprise applications.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • In order to describe the manner in which the above-recited and other advantages and features of the disclosure can be obtained, a more particular description of the principles briefly described above will be rendered by reference to specific examples thereof which are illustrated in the appended drawings. Understanding that these drawings depict only examples of the disclosure and are not therefore to be considered to be limiting of its scope, the principles herein are described and explained with additional specificity and detail through the use of the accompanying drawings in which:
  • FIG. 1 illustrates an example hybrid cloud network environment that can be utilized in an example embodiment;
  • FIGS. 2A and 2B illustrate example approaches for distributing network traffic in a hybrid cloud environment that can be utilized in some example embodiments;
  • FIG. 3 further illustrates an example approach for forwarding network traffic and enforcing security policy in a network environment similar to that of FIG. 2B;
  • FIG. 4 illustrates an example data flow diagram for establishing communications between virtual machines in a hybrid cloud environment that can be utilized in an example embodiment;
  • FIG. 5 illustrates an example data flow diagram for establishing communications between virtual machines in a hybrid cloud environment that can be utilized in another example embodiment;
  • FIG. 6 an example hybrid cloud network environment that can be utilized in another example embodiment; and
  • FIGS. 7A and 7B illustrate example systems that can be used in various example embodiments.
  • DESCRIPTION OF EXAMPLE EMBODIMENTS
  • The detailed description set forth below is intended as a description of various configurations of example embodiments and is not intended to represent the only configurations in which the subject matter of this disclosure can be practiced. The appended drawings are incorporated herein and constitute a part of the detailed description. The detailed description includes specific details for the purpose of providing a more thorough understanding of the subject matter of this disclosure. However, it will be clear and apparent that the subject matter of this disclosure is not limited to the specific details set forth herein and may be practiced without these details. In some instances, structures and components are shown in block diagram form in order to avoid obscuring the concepts of the subject matter of this disclosure.
  • OVERVIEW
  • Network policies can be used to optimize the flow of network traffic between virtual machines (VMs) in a hybrid cloud environment. In an example embodiment, one or more policies can drive a virtual switch controller, a hybrid cloud manager, a hypervisor manager, a virtual switch, or other orchestrator to create one or more direct tunnels that can be utilized by a respective pair of VMs to bypass the virtual switch and enable direct communication between the VMs. The virtual switch can send the VMs network and security policies to ensure that these policies are enforced. The VMs can exchange security credentials in order to establish the direct tunnel. The direct tunnel can be used by the VMs to bypass the virtual switch and allow the VMs to communicate with each other directly.
  • DETAILED DESCRIPTION
  • A computer network is a geographically distributed collection of nodes interconnected by communication links and segments for transporting data between endpoints, such as personal computers and workstations. Many types of networks are available, with the types ranging from Local Area Networks (LANs) and Wide Area Networks (WANs) to overlay networks and Software-Defined Networks (SDNs).
  • LANs typically connect nodes over dedicated private communications links located in the same general physical location, such as a building or campus. WANs, on the other hand, typically connect geographically dispersed nodes over long-distance communications links, such as common carrier telephone lines, optical lightpaths, synchronous optical networks (SONET), or synchronous digital hierarchy (SDH) links. LANs and WANs can include layer 2 (L2) and/or layer 3 (L3) networks and devices.
  • The Internet is an example of a WAN that connects disparate networks throughout the world, providing global communication between nodes on various networks. The nodes typically communicate over the network by exchanging discrete frames or packets of data according to predefined protocols, such as the Transmission Control Protocol/Internet Protocol (TCP/IP). In this context, a protocol can refer to a set of rules defining how the nodes interact with each other. Computer networks may be further interconnected by an intermediate network node, such as a router, to extend the effective size of each network.
  • Overlay networks generally allow virtual networks to be created and layered over a physical network infrastructure. Overlay network protocols, such as Virtual Extensible LAN (VXLAN), Network Virtualization using Generic Routing Encapsulation (NVGRE), Network Virtualization Overlays (NVO3), and Stateless Transport Tunneling (STT), can provide a traffic encapsulation scheme to allow network traffic to be carried across L2 and L3 networks over a logical tunnel.
  • Overlay networks can also include virtual segments, such as VXLAN segments in a VXLAN overlay network, which can include virtual L2 and/or L3 overlay networks over which virtual machines (VMs) communicate. The virtual segments can be identified through a virtual network identifier (VNI), such as a VXLAN network identifier, which can specifically identify an associated virtual segment or domain.
  • Network virtualization allows hardware and software resources to be combined in a virtual network. For example, network virtualization can allow multiple numbers of VMs to be attached to the physical network via respective virtual LANs (VLANs). The VMs can be grouped according to their respective VLAN, and can communicate with other VMs as well as other devices on the internal or external network.
  • Cloud computing can also be provided in a network to provide computing services using shared resources. Cloud computing can generally include Internet-based computing in which computing resources are dynamically provisioned and allocated to client or user computers or other devices on-demand, from a collection of resources available via the network (e.g., “the cloud”). Cloud computing resources, for example, can include any type of resource, such as computing, storage, and networking, among others. For instance, resources may include service devices (firewalls, deep packet inspectors, traffic monitors, load balancers, etc.), compute/processing devices (servers, CPUs, GPUs, random access memory, caches, etc.), and storage devices (e.g., network attached storages, storage area network devices, hard disk drives, solid-state devices, etc.), among others. In addition, such resources may be used to support virtual networks, VMs, databases, applications (“apps”), etc.
  • Cloud computing resources may include a “private cloud,” a “public cloud,” and/or a “hybrid cloud.” A “private cloud” can be a cloud infrastructure operated by an enterprise for use by the enterprise, while a “public cloud” can be a cloud infrastructure that provides services and resources over a network for public use. A “hybrid cloud” can be a cloud infrastructure composed of two or more clouds that inter-operate or federate through cloud orchestration, cloud management, cloud automation, or similar technologies. A hybrid cloud can be thought of as an interaction between private and public clouds where a private cloud joins a public cloud and utilizes public cloud resources in a secure and scalable manner.
  • FIG. 1 illustrates an example hybrid cloud network environment 100 that can be utilized in an example embodiment. Hybrid cloud network environment 100 can include a plurality of networks or clouds, such as a private cloud 102 (e.g., an enterprise virtual datacenter) and a public cloud 104 separated by a WAN 106, such as the Internet. Although a hybrid cloud is sometimes defined as consisting of a private cloud and a public cloud, it should be understood that many aspects of this disclosure can be practiced in various configurations (e.g., two or more public clouds hosted by third party cloud providers and/or two or more private clouds of an enterprise located in different locations). The private cloud 102 and the public cloud 104 can be integrated using overlay network techniques, such as VXLAN, NVGRE, NVO3, STT, or other overlay network protocols known to those of ordinary skill. The private cloud 102 and public cloud 104 can be connected via a site-to-site tunnel or communication link 108 between a private cloud network gateway 110 and a public cloud network gateway 112. The private cloud network gateway 110 can be configured as a VM for extending the private cloud across the Internet to the public cloud 104 through the site-to-site tunnel 108. The public cloud network gateway 112 can be configured as a VM switch overlay for interconnecting workloads running in the public cloud 104 via secure access tunnels, and for forwarding network traffic to the private network 102 using the site-to-site tunnel 108. In an example embodiment, the private cloud network gateway 110 can be implemented using Intercloud Fabric™ Extender (ICX) from Cisco®, Systems, Inc. of San Jose, Calif., the public cloud network gateway 112 can be implemented using Intercloud Fabric™ Switch (ICS) from Cisco®, and the ICX/ICS pair can form an Intercloud Fabric™ Cloud (ICFCloud).
  • In some example embodiments, the private cloud network gateway 110 can establish, from the private cloud 102, the secure site-to-site tunnel 108 to interconnect with the public cloud network gateway 112, and interact with a virtual switch controller or Virtual Supervisor Module (VSM) 114. The VSM 114 can serve as a network controller for managing the network and security policies of the overlay network. In an example embodiment, the VSM 114 can be implemented in an active-standby model to ensure high availability, with a first VSM functioning in a primary role and a second VSM functioning in a secondary role. If the first VSM fails, the second VSM can take over control. A virtual chassis model can be used to represent VSM 114 and each virtual switch or Virtual Ethernet Module (VEM) under the VSM's control or within the VSM's domain, such as VEM 116 a in the private cloud and public cloud VEM 116 b. The high availability pair of VSMs 114 can be associated with slot numbers 1 and 2 in the virtual chassis, and the VEMs 116 a and 116 b can be sequentially assigned to the remaining slots. In the virtual chassis model, VSM 114 may be configured to provide control plane functionality for the virtual switches or VEMs 116 a and 116 b. The VEMs 116 a and 116 b can provide network connectivity and switching capability for VMs hosted on a corresponding server like a line card in a modular switching platform, and can operate as part of a data plane associated with the control plane of VSM 114. Unlike multiple line cards in a single chassis, each VEM can act as an independent switch from a forwarding perspective. In some example embodiments, the VEMs 116 a and 116 b may form a distributed virtual switch that can be controlled by the VSM 114. In an example embodiment, the VSM 114 and VEMs 116 a and 116 b can be implemented using Cisco Nexus® 1000V Series Switches.
  • The private cloud 102 can also include a hybrid cloud manager 120, which can be a management plane VM for auto-provisioning resources within the hybrid cloud network environment 100. The hybrid cloud manager 120 can be a management platform running in the private cloud 102, and may be responsible for providing hybrid cloud operations, translating between private cloud and public cloud interfaces, managing cloud resources, instantiating cloud gateways and cloud VMs though a private virtualization platform or hypervisor manager 122 and public cloud provider application programming interfaces (APIs). The hybrid cloud manager 120 may also monitor the health of all of the components of the network (e.g., cloud gateways, VMs, and communication links) and ensure high availability of those components.
  • In an example embodiment, the hybrid cloud manager 120 can be implemented as a virtual appliance, such as the Intercloud Fabric™ Director (ICFD) from Cisco®. The ICFD can be a hybrid cloud orchestration component that can provide a single point of management and consumption of hybrid cloud resources. That is, the ICFD can offer a single console so that users can provision workloads and associated policies. The ICFD can also expose northbound APIs, which allow users to programmatically manage their workloads in the hybrid cloud environment 100 or integrate with other cloud management platforms.
  • The private cloud 102 can include one or more physical servers 124 that each deploy a hypervisor 126 (also sometimes referred to as a virtual machine manager or a virtual machine monitor (VMM)). The hypervisor 126 may be computer software, firmware, or hardware that creates and runs one or more VMs, such as VMs 128 or cVMs 118. Although the cVMs 118 are not shown to be encapsulated by a hypervisor in this example, it will be appreciated that VMs may or may not be managed by a hypervisor. The hypervisor 126 can provide a respective operating system to one or more VMs. In some example embodiments, the hypervisor 126 may be a native or “bare metal” hypervisor that runs directly on hardware, but that may alternatively run under host software executing on hardware. The hypervisor 126 can be managed by the virtualization platform or hypervisor manager 122, such as vSphere® from VMware®, Inc. of Palo Alto, Calif., Hyper-V® from Microsoft® Corp. of Seattle, Wash., XenServer® from Citrix® Systems, Inc. of Santa Clara, Calif., or Red Hat® Enterprise Virtualization from Red Hat®, Inc. of Raleigh, N.C.
  • Each VM, including VMs 128 and cVMs 118, can host a private application. In some example embodiments, each public cloud VM 118 may be connected to the public cloud network gateway 112 via secure access tunnels, as discussed elsewhere herein. In some example embodiments, one or more cVMs 118 can be configured to operate as a public cloud firewall (not shown), such as an Intercloud Fabric™ Firewall or Virtual Security Gateway (VSG) from Cisco®. In some example embodiments, one or more cVMs 118 can be configured to operate as a public cloud router (not shown), such as an Intercloud Fabric™ Router or Cloud Services Router (CSR) from Cisco®.
  • In some example embodiments, the public cloud network gateway 112 can establish, from the public cloud 104, the secure site-to-site tunnel 108 to interconnect with the private cloud network gateway 110, secure access tunnels to connect public cloud VMs (cVMs) 118, and monitor and report statistics for the public cloud VMs and any component failures in the public cloud 104. In some example embodiments, the private cloud network gateway 110 and the public cloud network gateway 112 can be deployed as a high-availability pair to provide redundancy. In some example embodiments, the public cloud network gateway 112 can include a cloud virtual switch or cloud Virtual Ethernet Module (cVEM) 116 b that communicates with the VSM 114 to retrieve VM-specific network policies (e.g., port profiles), switches network traffic between public cloud VMs 118, switches network traffic between public cloud VMs and the private cloud 102, applies network policies, and monitors and reports VEM-related statistics.
  • In some example embodiments, each physical server, such as physical server 124, hosting a VM, including VM 128 and cVM 118, can include multiple Virtual Network Interface Cards (VNICs) (not shown) for providing specific functionality, such as control and/or data/packet transmission. For example, a VM on a physical server can include a vNIC that may be connected to a VEM, such as VEM 116 a or cVEM 116 b, for connecting the VM or cVM to the network. Each physical server 124 can include a vNIC for enabling control functionality, such as Small Computer Systems Interface over IP (iSCSI), Network File System (NFS) access, migration of VMs or cVMs, directly connected tunnels, discussed elsewhere herein, as well as other control functionality.
  • In some example embodiments, each public cloud VM 118 can include an agent (not shown) that provides for the network overlay logic for the public cloud VM. The agent can be deployed in the cVM as a secure tunnel driver. The agent can establish a secure access tunnel to connect the public cloud VM 118 to the public cloud network gateway 112, and monitor and report secure overlay-related statistics. In an example embodiment, the agent can be implemented using Intercloud Fabric™ Agent (ICA) from Cisco®.
  • In some example embodiments, the secure site-to-site tunnel or communication link 108 can take one of several forms, such as various types of virtual private networks (VPNs) or Layer 2 (L2) tunneling protocols. For example, some example embodiments may utilize an open VPN (e.g., OpenVPN) overlay or an IP Security (IPSec) VPN based L3 network extension to provide the communication link 108. Some example embodiments may utilize a secure transport layer (i.e., L4) tunnel as the communication link 108 between the private cloud network gateway 110 and the public cloud network gateway 112, where the secure transport layer tunnel 108 can be configured to provide a link layer (i.e., L2) network extension between the private cloud 102 and the public cloud 104. Some example embodiments may establish the secure transport layer (i.e., L4) tunnel 108 (e.g., Transport Layer Security (TLS), Datagram TLS (DTLS), Secure Socket Layer (SSL), etc.) over the public network 104, and can build a secure L2 switch overlay that interconnects public cloud resources with private clouds (e.g., enterprise network backbones). In other words, the secure transport layer tunnel 108 can provide a link layer network extension between the private cloud 102 and the public cloud 104.
  • In an example embodiment, the private cloud network gateway 110 can use an L4 secure tunnel as the communication link 108 to connect to the cloud resources allocated in the public cloud 104. The L4 secure tunnel may be well-suited for use with corporate firewalls and Network Address Translation (NAT) devices due to the nature of the transport level protocols (e.g., UDP/TCP) and the transport layer ports opened for HTTP/HTTPS in the firewall. The L2 network can thus be further extended and connected to each of the cloud VMs 118 through the public cloud network gateway 112. With an L2 network overlay, instances of a particular private application VM can be seamlessly migrated to the overlay network dynamically created in the public cloud 104, without substantial impact to existing corporate infrastructure.
  • FIGS. 2A and 2B illustrate example approaches for distributing VM-to-VM network traffic in a public cloud 204 of a hybrid cloud network that can be utilized in some example embodiments. In FIG. 2A, the public cloud environment 204 can include a public cloud network gateway 212 and public cloud VMs 218 a, 218 b, 218 c, and 218 d. For example, a cloud manager (e.g., cloud manager 120 of FIG. 1) (not shown) can be used to deploy an intercloud fabric for integrating a private cloud (e.g., private cloud 102 of FIG. 1) (not shown) with a public cloud, such as the public cloud 204. The cloud manager can interface with a hypervisor manager (e.g., hypervisor manager 122 of FIG. 1) (not shown) to instantiate a VM (e.g., VM 128 of FIG. 1) (not shown) in the private cloud and configure the VM to operate as a private cloud network gateway (e.g., private cloud network gateway 110 of FIG. 1) (not shown). The cloud manager can also interface with a hypervisor manager in the public cloud 204 or cloud provider APIs to instantiate a plurality of public cloud VMs (e.g., cVMs 218 a, 218 b, 218 c, or 218 d). One or more of the cVMs can be configured to operate as the public cloud network gateway 212. One or more of the cVMs can be configured to operate as a public cloud firewall (not shown). One or more of the cVMs can be configured to operate as a public cloud router (not shown). One or more of the cVMs can be configured for migrating workloads from the private cloud to the public cloud 204.
  • The cloud manager can also establish a site-to-site tunnel or secure network extension 208 between the private cloud network gateway and the public cloud network gateway 212. As discussed, in some example embodiments, a public cloud VM agent 230 can be utilized to provide a compute environment and network overlay for the public cloud VMs 218 a, 218 b, 218 c, and 218 d. The cVMA 230 can be deployed in a public cloud VM as a secure tunnel driver that runs within the public cloud VM's operating system. The agent 230 can cause a cVM to direct network traffic to the secure overlay network by establishing a secure tunnel (e.g., access tunnels 232 a and 232 b) to connect to the public cloud network gateway 212 for allowing the cVMs to communicate with private cloud VMs and other public cloud VMs. The cVMA 230 can also collect secure overlay-related statistics.
  • In the public cloud 204, the access tunnel 232 a can be used for secure communications between cVM 218 a and 218 d, and the access tunnel 232 b can be used for secure communications between public cloud VM 218 b and public cloud VM 218 c. For instance, if the public cloud VM 218 a desires to send a packet to the public cloud VM 218 d, the packet can first be sent to the public cloud network gateway 212, where network and security policy may be enforced. Then the public cloud network gateway 212 may forward the packet to the cVM 218 d. That is, packets sent between cVMs 218 a and cVM 218 d may pass through the public cloud network gateway 212 before arriving at the packets' intended destinations.
  • In certain situations, the public cloud network gateway 212 can become a bottleneck for a hybrid cloud network, such as when the public cloud network gateway is used to connect a large number of cVMs and/or large-sized cVMs. Under these circumstances, an alternative or additional process can be used for enabling communications between cVMs. FIG. 2B illustrates an example approach. In FIG. 2B, a direct connection or Directly Connected Tunnel (DCT) 234 a may be established between cVM 218 a and cVM 218 d, and a direction connection or DCT 234 b may be established between cVM 218 b and 218 c. Network traffic between cVMs 218 a and 218 d can bypass the public cloud network gateway 212 by transmitting the traffic through the directly connected tunnel 234 a. Likewise, communications between cVMs 218 b and 218 c can bypass the public cloud network gateway 212 by sending the communications over the directly connected tunnel 234 b.
  • As used herein, a direct connection or DCT can refer to a direct connection from an overlay network perspective rather than a direct physical connection. For example, cVMs 218 a and 218 d may not be directly connected to a same Ethernet (L2) hub, but can achieve L2 adjacency via VXLAN, NVGRE, NVO3, STT, or other suitable overlay network protocol. For instance, access tunnel 232 a may be referred to as an indirect tunnel because traffic between cVMs 218 a and 218 d includes a hop over the public cloud network gateway 212. DCT 234 a can be referred to as a direct tunnel because it does not include such hop. Although DCTs can reduce bandwidth requirements of the public cloud network gateway 212 and minimize the chances of the public cloud network gateway becoming a bottleneck for the hybrid cloud network, bypassing the public cloud network gateway may also result in network and security policy becoming unenforced.
  • FIG. 3 further illustrates an example approach for forwarding network traffic and enforcing security policy in a network environment similar to that of FIG. 2B. In FIG. 3, the public cloud environment 304 can include a public cloud network gateway 312 interconnected with public cloud VMs 318 a and 318 b. The cVM 318 a can be assigned IP address 10.10.10.10 and MAC address aa.aa.aa, and the cVM 318 b can be assigned IP address 20.20.20.20 and MAC address bb.bb.bb. The cVMs 318 a and 318 b may be indirectly connected via a secure access tunnel 332. That is, traffic between these cVMs transmitted along the access tunnel at one endpoint of the access tunnel can include a hop over the public cloud network gateway 312 before arriving at the other end of the access tunnel. The secure access tunnel 332 can be associated with tunnel identifier 1. The cVMs 318 a and 318 b may also be directly connected via a direct connection or DCT 334. The DCT 334 can be associated with tunnel identifier 2.
  • By default, the cVMs 318 a and 318 b can communicate with each other through the secure access tunnel 332 (and through the public cloud network gateway 312). The public cloud network gateway 312 can establish the access tunnel 332 as a default access tunnel during the initial deployment of a cVM and have network traffic between cVMs pass through the public cloud network gateway as a default forwarding policy. For example, cVM 318 a's egress forwarding table 336 can be initialized to include an entry of “*” or all addresses for the destination IP address, “*” or all addresses for the destination MAC address, and a tunnel identifier of 1 to indicate that cVM 318's egress traffic should be forwarded on the default access tunnel 1, i.e., forwarded to the public cloud network gateway 312. The cVM 318 b can have a similar egress forwarding table including a similar default forwarding policy. In the example embodiment of FIG. 3, the cVM 318 b may have a default security policy or Access Control List (ACL) that denies all incoming traffic, which can be represented in the cVM 318 b's ingress security policy table 338 as an entry including “*” or all addresses for the source address, “*” or all tunnels for the tunnel identifier, and a “Deny” rule for dropping incoming traffic corresponding to the source address and source tunnel. The cVM 318 a may include a similar ingress security policy table with a default security policy or ACL.
  • To optimize network traffic flow in the public cloud environment 304 and ensure that security policy is enforced, policies can be defined for connecting a first cVM to a second cVM via a DCT. In an example embodiment, a DCT policy can be on-demand or enforced when any cVM mutually connected to a same public cloud network gateway attempt to communicate with one another. For instance, the public cloud network gateway can be configured to orchestrate the creation of a DCT tunnel between a pair of cVMs based on an initial attempted cVM-to-cVM communication via a secure access tunnel, such as an Address Resolution Protocol (ARP) request. In another example embodiment, a DCT policy can be application-driven or enforced by a cloud orchestration component (e.g., the VSM 114 of FIG. 1, cloud manager 120 of FIG. 1, hypervisor manager 122 of FIG. 1, or other suitable management interface) based on application network profiles or requirements (e.g., Application Network Profiles (ANPs) in the Cisco Application Centric Infrastructure (Cisco ACI™)). For instance, the management interface can be utilized to configure a public cloud network gateway to set up one or more DCTs among a set of cVMs connected to the gateway based on the application network profiles or requirements.
  • In an example embodiment, a DCT policy can be statistics-driven or enforced according to metrics relating to the hybrid cloud network. For instance, a cVM agent and/or public cloud network gateway can monitor latency, bandwidth, throughput, response time, or other suitable processing and/or network performance measurement until such measurement is below a threshold, above a threshold, or otherwise satisfies a threshold condition. Upon satisfying the threshold condition, the public cloud network gateway can establish one or more DCTs to address the threshold condition. For example, a public cloud network gateway can be configured to create DCTs on-demand once CPU utilization reaches an upper bound and can revert to a previous network policy when CPU utilization is below a lower bound. As another example, a cVM agent can monitor and report network latency to a VSM (e.g., the VSM 114 of FIG. 1), cloud manager (e.g., cloud manager 120 of FIG. 1), hypervisor manager (e.g., hypervisor manager 122 of FIG. 1), or other suitable management interface. When network latency for the cVM reaches a minimum criterion, the management interface can direct the public cloud network gateway to establish one or more DCTs for that cVM to alleviate the network latency. In various example embodiments, other policies can be defined for establishing DCTs as would be known to one of ordinary skill in the art.
  • To establish the DCT 334 between the cVMs 318 a and 316 b, the public cloud network gateway 312 can send network address information and security information (e.g., keys credentials, certificates, or other authentication information) 340 relating to cVM 318 b to the cVM 318 a over the secure access tunnel 332. This can cause the egress forwarding policy table 336 to be updated with an entry, such as “20.20.20.20” for the destination IP address, “bb.bb.bb” for the destination MAC address, and tunnel identifier 2, indicating that traffic intended for the cVM 318 b sent by the cVM 318 a should be delivered over direct tunnel 334. The public cloud network gateway 312 can also send security policy information 342 to ensure applicable security policies are enforced. In this example, the security policy information 342 can cause the ingress security policy table 338 to be populated with an entry comprising “10.10.10.10” for a source address, tunnel identifier 2, and an “Allow” rule, which indicates that traffic originating from the source address sent over the DCT 334 can be accepted by the cVM 318 b. In an example embodiment, physical servers hosting cVMs 318 a and 318 b can include control interfaces that can be used to form a control tunnel 344 between cVMs 318 a and 318 b. The first cVM's address and security information 340 and the second cVM's security policy information 342 can be sent over the control tunnel 344. In another example embodiment, such information can be sent over the secure access tunnel 332.
  • FIG. 4 illustrates an example data flow diagram 400 for establishing communications between VMs in a hybrid cloud environment that can be utilized in an example embodiment. Data flow diagram 400 may be used for enforcing an on-demand DCT policy, such as when a network is configured to establish a DCT tunnel upon any attempted communication between cVMs connected to the gateway, or the network has defined a statistics-driven DCT policy and a threshold condition corresponding to the policy is satisfied. In this example embodiment, a first VM 418 a and a second VM 418 b are each connected to a virtual switch or public cloud network gateway 412. A secure access tunnel 432 can be established between the cVMs during their deployment. The access tunnel 432 can include a hop over the public cloud network gateway 412. The cVM 418 a's forwarding table (e.g., egress forwarding policy table 336 of FIG. 3) can be initialized with a default rule to send egress traffic to the public cloud network gateway 412 over the access tunnel 432. The cVM 418 b's forwarding table may include a similar entry. The respective physical servers hosting cVMs 418 a and 418 b may include respective control interfaces such that a control tunnel 444 can also be created between cVMs 418 a and 418 b.
  • The first cVM 418 a can attempt to communicate with the second cVM 418 b, and may begin at 402 by sending an ARP request to the virtual switch or public cloud network gateway 412 to determine network address information for the second cVM. The ARP request can be sent over the secure access tunnel 432 based on the first cVM's default forwarding rule. Upon receiving the ARP request at 404, the virtual switch or public cloud network gateway 412 can resolve the requested network address information such as by looking up the requested network address in the switch's ARP cache to identify the MAC address of the second cVM 418 b. The switch 412 can also retrieve the second cVM's security information, such as keys, credentials, certificates, or other information necessary for establishing a DCT with the second cVM 418 b. Keys, credentials, or certificates can include passwords, private keys generated from public-key cryptography methods (e.g., Rivest-Shamir-Adleman (RSA), Digital Signature Algorithm (DSA), Elliptical Curve Digital Signature Algorithm (ECDSA), Diffie-Helman (DH), Elliptic Curve Diffie-Hellman (ECDH)), or secret keys generated from symmetric-key cryptography methods (e.g., International Data Encryption Algorithm (IDEA), Data Encryption Standard (DES), Triple-DES, Advanced Encryption Standard (AES), ARCFOUR (RC4), Blowfish, Twofish, Carlisle Adams Stafford Tavares (CAST), etc. In various example embodiments, other authentication methods (e.g., Kerberos, NT LAN Manager (NTLM), and keyboard-interactive, etc.), and new authentication methods as they become available. The switch 412 can send the ARP reply to the first cVM 418 a over the default tunnel 432. The DCT configuration information can be piggybacked onto the ARP reply.
  • The virtual switch 412 can also fetch the security policy rules relevant to the second cVM 418 b and may send the security policies to the second cVM's control interface at 406. At 408, after the first cVM 418 a has received the ARP reply and the second cVM's security information, the first cVM can begin the DCT establishment process or protocol by sending a DCT connection request to the second cVM 418 b over the control tunnel 444. The DCT connection request can include information for authenticating the first cVM 418 a derived from the second cVM's security information, as well as keys, credentials, certificates, or other information necessary to establish a DCT with the first cVM.
  • At 410, after the second cVM 418 b can receive the security policies from the virtual switch 412 and the DCT connection request from the first cVM 418 a, the second cVM may attempt to authenticate the first cVM using the first cVM's authentication information within the DCT connection request. Upon authentication of the first cVM 418 a, the second cVM 418 b can establish itself as one endpoint of the DCT 434, such as by updating its ingress security policy table using the received security policies. The second cVM 418 b may then send a DCT connection reply that includes information authenticating the second cVM with information derived from the first cVM's security information. As a part of the DCT establishment process or protocol, the second cVM 418 b may also update its egress forwarding table with an entry for forwarding egress traffic to the first cVM 418 a through the DCT 434.
  • At 413, after the first cVM 418 a has received the DCT connection reply, the first cVM may attempt to authenticate the second cVM 418 b using the second cVM's authentication information within the DCT connection reply. If the second cVM 418 b is authenticated, the first cVM 418 a may establish itself as the other endpoint of the DCT 434, such as by updating its egress forwarding policy table with an entry forwarding traffic to the second cVM through the DCT. The first cVM 418 a may subsequently send its application traffic directly to the second cVM 418 b via the DCT 434 at 414, and the second cVM 418 b can send its application traffic directly to the first cVM 418 a via the DCT 434 at 416.
  • FIG. 5 illustrates an example data flow diagram 500 for establishing communications between VMs in a hybrid cloud environment that can be utilized in another example embodiment. Data flow diagram 500 may be used for enforcing an application-driven DCT policy. For instance, instead of being acted upon according to real-time cVM-to-cVM traffic, such as in the case with an on-demand or statistics-driven DCT policy, an application-driven policy may be based on ANPs or application network requirements. Thus, it may be required to have prior knowledge of the application-level network topology and security requirements of an application before its deployment. Another difference between data flow diagrams 400 and 500 may lie in the first few steps of each process. That is 502 and 504 of the data flow diagram 500 may differ from 402 and 404 of the data flow diagram 400 but 506 through 516 of the data flow diagram 500 may be the same or substantially similar to 406 through 416 of the data flow diagram 400.
  • The data flow diagram 500 may begin by defining an ANP based on prior knowledge of the application's network and security requirements. The ANP can include configuration of endpoints (e.g., network and security policies) and security information (e.g., keys, credentials, certificates, or other authentication information. A cloud orchestration component 546 (e.g., the VSM 114 of FIG. 1, cloud manager 120 of FIG. 1, hypervisor manager 122 of FIG. 1, or other management interface) can be used to push the ANP to a virtual switch or public cloud network gateway 512 over a control tunnel 544 at 502. In another example embodiment, the ANP can be sent through a secure access tunnel. Based on receiving the ANP from the cloud orchestrator 546, the virtual switch 512 can build one or more DCT tunnels 534 between various VM pairs (e.g., cVMs 518 a and 518 b) one-by-one until each application node, configured to bypass the virtual switch according to the ANP, is connected to a DCT. For example, the virtual switch 512 can send DCT configuration to one or more cVMs over the control tunnel 544. In another example embodiment, the DCT configuration information can be sent over a secure access tunnel. As discussed, 506 through 516 can be the same or substantially the same as 406 through 416 of FIG. 4.
  • FIG. 6 illustrates an example hybrid cloud network environment 600 that can be utilized in another example embodiment. The hybrid cloud network environment 600 can include a private cloud (e.g., private cloud 102 of FIG. 1) (not shown) interconnected to a public cloud 604 via a secure network extension or site-to-site tunnel 608. The public cloud 604 can comprise a plurality of hosts, such as a web host 648, an application host 650, and a database host 652. Each host can be implemented as a virtual machine or a bare metal host. The web host 648 can include a public cloud network gateway 612 a that interconnects the host to the private cloud by the secure site-to-site tunnel 608. The public cloud network gateway 612 a can also interconnect the web host 648 to the application host 650 by a secure inter-gateway tunnel 654 a.
  • The web host 648 can also include web containers 656 a and 656 b. In an example embodiment, the public cloud network gateway 612 a can also be implemented as a container. A container is a kind of lightweight virtual machine utilized in operating system level virtualization. Operating system level virtualization is a type of server virtualization in which the kernel of an operating system may be capable of providing multiple isolated user space instances or containers. Unlike whole system server virtualization, in which a single server can host multiple operating systems, operating system level virtualization can be used to partition a single operating system among multiple containers. Containers may use less memory and CPU than whole system VMs running similar workloads because only a single kernel may be executed using containers whereas multiple kernels may be executed using whole system VMs. However, containers can raise security concerns not applicable to whole system VMs due to operating system resources being shared.
  • The application host 650 can include a public cloud network gateway 612 b and application containers 656 c and 656 d. The public cloud network gateway 612 b can be used to interconnect the application host 650 to the web host 648 via the secure inter-gateway tunnel 654 a, and the application host 650 to the database host 652 via the secure inter-gateway tunnel 654 b. The database host 652 can include a public cloud network gateway 612 c and database container 656 e. As illustrated in FIG. 6, the public cloud 604 can be used to implement a conventional multi-tier or three-tier architecture including a web or presentation tier corresponding to the web host 648, an application or logic tier corresponding to the application host 650, and a data or database tier corresponding to the database host 652.
  • In the example embodiment of FIG. 6, one or more application-driven DCT policies can be applied to the public cloud network 604 to create the multi-tier application architecture and the secure inter-gateway tunnels 654 a and 654 b. Using this approach, the public cloud network gateways can provide default network connectivity to every container (e.g., via access tunnels) while optimizing network traffic flow by using the DCTs as a primary data path for exchanging application traffic.
  • FIG. 7A illustrates an example embodiment of a physical server 724, such as physical server 124 of FIG. 1. The physical server 724 can include hardware 758, a hypervisor 726 (e.g., hypervisor 126 of FIG. 1), and a public cloud virtual machine 718 (e.g., cVM 118 of FIG. 1). Hardware 758 can represent any machine or apparatus capable of accepting, performing logic operations on, storing, or displaying data, and may include a processor 760 and memory 762. In this example embodiment, a cVM agent 730 (e.g., cVM agent 230 of FIG. 2) can be installed on the cVM 718 when the cVM is deployed on the physical server 724. The cVM agent 730 can include software, such as a network overlay module 764 and a DCT protocol module 766. The network overlay module 764 can be used to provide a compute environment and network overlay for the cVM 718, and can include logic for establishing a secure tunnel (e.g., access tunnel 332 of FIG. 3) to connect the cVM 718 to a public cloud network gateway (not shown). The DCT protocol module 766 can include logic for performing the DCT protocol or process discussed with respect to FIGS. 4 and 5. The memory 762 can be used to store an egress forwarding policy table, such as egress forwarding policy table 336 of FIG. 3, and an ingress security policy table, such as ingress security policy table 338 of FIG. 3.
  • FIG. 7B illustrates an example embodiment of a public cloud network gateway 712, such as the public cloud network gateway 112 of FIG. 1. The public cloud network gateway 712 can include hardware 768 and public cloud network gateway software, such as an Input/Output (I/O) interface 770 and a DCT protocol module 772. I/O interface 770 can enable the public cloud network gateway 712 to communicate with components located within the same public cloud as the gateway, as well as with other public cloud network gateways and with a private cloud (e.g., private cloud 102 of FIG. 1) (not shown).
  • I/O interface 770 can include a site-to-site tunnel interface 774, an inter-gateway tunnel interface 776, and an access tunnel interface 778. Site-to-site tunnel interface 774 can be used by the public cloud network gateway 712 to communicate with a private cloud network gateway (e.g., private cloud network gateway 110 of FIG. 1) (not shown) over a secure site-to-site tunnel, such as secure site-to-site tunnel 108 of FIG. 1. Inter-gateway tunnel interface 776 can be used by the public cloud network gateway 712 to communicate with other public cloud network gateways over inter-gateway tunnels, such as inter-gateway tunnels 654 a and 654 b of FIG. 6. Access tunnel interface 778 can be used by the public cloud network gateway 712 to communicate with cVMs (e.g., cVM 718) over secure access tunnels, such as access tunnel 332 of FIG. 3 or over an overlay network, such as a VXLAN, NVGRE, NVO3, STT, or other overlay network.
  • The DCT protocol module 772 can include logic for performing the DCT protocol or process discussed with respect to FIGS. 4 and 5. Hardware 768 can represent any machine or apparatus that is capable of accepting, performing logic operations on, storing, or displaying data, and may include a processor 780 and memory 782. Memory 782 can include, for example, a hash map, table, or other suitable data structure for storing the network address information of cVMs in the public cloud, such as an ARP cache, a cVM MAC address-to-VEM IP address mapping, a forwarding table, or other network address data structure. Memory 782 can also include a database or other suitable data structure for storing DCT configuration information, including security policies and security information (e.g., keys, credentials, certificates, or other authentication information) for each cVM attached to the public cloud network gateway 712. Memory 782 can further include one or more tables, lists, or other data structures for storing data associated with certain operations described herein.
  • In an example embodiment, the public cloud network gateway 712, physical server 724, and/or physical switches connected to these components (not shown) can be network elements, which can encompass network appliances, servers, routers, switches, firewalls gateways, bridges, load balancers, modules, or any other suitable device, proprietary component, element, or object operable to exchange information in a network environment. Network elements may include any suitable hardware, software, components, modules, or objects that facilitate the operations thereof, as well as suitable interfaces for receiving, transmitting, and/or otherwise communicating data or information in a network environment. This may be inclusive of appropriate algorithms and communication protocols that allow for the effective exchange of data or information.
  • In regards to the internal structure associated with the above network elements, each of the public cloud network gateway 712, physical server 724, and/or a physical switches connected to these components (not shown) can include memory elements for storing information to be used in the operations disclosed herein. Additionally, physical server 724 may also include virtual memory elements for storing information associated with virtual partitions, such as public cloud virtual machine 718. Each of VSM 702, virtualized system 706, VEM 714, and/or a connected physical switch may keep information in any suitable memory element (e.g., random access memory (RAM), read-only memory (ROM), erasable programmable ROM (EPROM), electrically erasable programmable ROM (EEPROM), application specific integrated circuit (ASIC), etc.), software, hardware, or in any other suitable component, device, element, or object where appropriate and based on particular needs. Any of the memory elements discussed herein (e.g., memory 762 and 782) should be construed as being encompassed within the broad term memory element or memory. Information being used, tracked, sent, or received by each of the public cloud network gateway 712, physical server 724, and/or a connected physical switch can be provided in any database, register, queue, table, cache, control list, or other storage structure, all of which can be referenced at any suitable timeframe. Any such storage options may be included within the broad term memory element or memory as used herein.
  • In an example embodiment, each of the public cloud network gateway 712, physical server 724, and/or a connected physical switch may include software modules (e.g., DCT protocol) to achieve, or to foster operations as outlined herein. In other example embodiments, such operations may be carried out by hardware, implemented externally to these elements, or included in some other network device to achieve the intended functionality. Alternatively, these elements may include software (or reciprocating software) that can coordinate in order to achieve the operations, as outlined herein. In still other embodiments, one or all of these devices may include any suitable algorithms, hardware, software, components, modules, interfaces, or objects that facilitate the operations thereof.
  • For clarity of explanation, in some instances the subject matter of this disclosure may be presented as including individual functional blocks including functional blocks comprising devices, device components, steps or routines in a method embodied in software, or combinations of hardware and software.
  • Note that in certain example embodiments, the optimization and/or switch overlay bypass functions outlined herein may be implemented by logic encoded in one or more tangible, non-transitory media (e.g., embedded logic provided in an application specific integrated circuit (ASIC), digital signal processor (DSP) instructions, software (potentially inclusive of object code and source code) to be executed by a processor, or other similar machine, etc.). The computer-readable storage devices, mediums, and memories can include a cable or wireless signal containing a bit stream and the like. However, when mentioned, non-transitory computer-readable storage media expressly exclude media such as energy, carrier signals, electromagnetic waves, and signals per se.
  • Methods according to the above-described example embodiments can be implemented using computer-executable instructions that are stored or otherwise available from computer readable media. Such instructions can comprise, for example, instructions and data which cause or otherwise configure a general purpose computer, special purpose computer, or special purpose processing device to perform a certain function or group of functions. Portions of computer resources used can be accessible over a network. The computer executable instructions may be, for example, binaries, intermediate format instructions such as assembly language, firmware, or source code. Examples of computer-readable media that may be used to store instructions, information used, and/or information created during methods according to described examples include magnetic or optical disks, flash memory, USB devices provided with non-volatile memory, networked storage devices, and so on.
  • Devices implementing methods according to the subject matter of this disclosure can comprise hardware, firmware and/or software, and can take any of a variety of form factors. Typical examples of such form factors include laptops, smart phones, small form factor personal computers, personal digital assistants, and so on. Functionality described herein also can be embodied in peripherals or add-in cards. Such functionality can also be implemented on a circuit board among different chips or different processes executing in a single device, by way of further example.
  • The instructions, media for conveying such instructions, computing resources for executing them, and other structures for supporting such computing resources are means for providing the functions described in these disclosures.
  • Although a variety of examples and other information was used to explain aspects within the scope of the appended claims, no limitation of the claims should be implied based on particular features or arrangements in such examples, as one of ordinary skill would be able to use these examples to derive a wide variety of implementations. Further and although some subject matter may have been described in language specific to examples of structural features and/or method steps, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to these described features or acts. For example, such functionality can be distributed differently or performed in components other than those identified herein. Rather, the described features and steps are disclosed as examples of components of systems and methods within the scope of the appended claims.

Claims (20)

What is claimed is:
1. A method comprising:
receiving, by a first virtual machine from a virtual switch via a tunnel that includes a hop over the virtual switch, configuration information for establishing a second virtual machine as a second endpoint of a direct tunnel, the configuration information including second security information of the second virtual machine;
sending, from the first virtual machine to the second virtual machine, a request to connect to the second virtual machine via the direct tunnel, the request including first security information of the first virtual machine and first authentication information of the first virtual machine derived from the second security information;
receiving, by the first virtual machine from the second virtual machine, a reply that includes second authentication information of the second virtual machine derived from the first security information;
establishing the first virtual machine as a first endpoint of the direct tunnel;
sending first network traffic from the first virtual machine to the second virtual machine via the direct tunnel; and
receiving second network traffic by the first virtual machine from the second virtual machine via the direct tunnel.
2. The method of claim 1, further comprising:
adding an entry to an egress forwarding policy table of the first virtual machine to forward network traffic via the tunnel; and
sending, from the first virtual machine via the tunnel, an Address Resolution Protocol (ARP) request targeting the second virtual machine.
3. The method of claim 1, further comprising:
sending the configuration information from a cloud orchestrator to the virtual switch to cause the virtual switch to send the configuration information to the first virtual machine.
4. The method of claim 3, wherein the cloud orchestrator includes at least one of a virtual switch controller, a cloud manager, or a hypervisor manager.
5. The method of claim 1, further comprising:
receiving, by the second virtual machine from the virtual switch, one or more security policies corresponding to the second virtual machine;
receiving, by the second virtual machine from the first virtual machine, the request to connect to the second virtual machine via the direct tunnel;
establishing the second virtual machine as the second endpoint of the direct tunnel;
sending, from the second virtual machine to the first virtual machine, the reply that includes the second authentication information;
receiving the first network traffic by the second virtual machine from the first virtual machine via the direct tunnel; and
sending the second network traffic from the second virtual machine to the first virtual machine via the direct tunnel.
6. The method of claim 5, further comprising:
adding one or more first entries to an ingress security policy table of the second virtual machine based at least in part on the one or more security policies; and
adding a second entry to an egress forwarding policy table of the second virtual machine to forward network traffic destined for the first virtual machine via the direct tunnel.
7. The method of claim 5, wherein the one or more security policies, the request, and the reply are transceived via a control tunnel.
8. The method of claim 1, further comprising:
adding an entry to an egress forwarding policy table of the first virtual machine to forward network traffic destined for the second virtual machine via the direct tunnel.
9. The method of claim 1, further comprising:
installing a virtual machine agent onto the first virtual machine for establishing the direct tunnel.
10. The method of claim 1, further comprising:
applying a policy for establishing the direct tunnel.
11. The method of claim 10, wherein the policy includes at least one of an on-demand policy, an application-driven policy, or a statistics-driven policy.
12. A non-transitory computer-readable storage medium having stored therein instructions that, upon being executed by a processor, cause the processor to:
send, by a virtual switch to a first virtual machine via a tunnel that includes a hop over the virtual switch, configuration information for establishing a second virtual machine as an endpoint of a direct tunnel, the configuration information including second security information corresponding to the second virtual machine;
send, from the virtual switch to the second virtual machine, one or more security policies corresponding to the second virtual machine;
cause, by the virtual switch, the first virtual machine to send to the second virtual machine a request for connecting to the second virtual machine via the direct tunnel, the request including first authentication information of the first virtual machine derived from the second security information and first security information corresponding to the first virtual machine;
cause, by the virtual switch, the second virtual machine to send to the first virtual machine a reply that includes second authentication information of the second virtual machine derived from the first security information; and
establish the direct tunnel between the first virtual machine and the second virtual machine.
13. The non-transitory computer-readable storage medium of claim 12, wherein the instructions upon being executed further cause the processor to:
receive, by the virtual switch from the first virtual machine, an Address Resolution Protocol (ARP) request targeting the second virtual machine; and
resolve, by the virtual switch, network address information of the second virtual machine,
wherein the configuration information is sent as a part of an ARP reply that includes the network address information of the second virtual machine.
14. The non-transitory computer-readable storage medium of claim 12, wherein the instructions upon being executed further cause the processor to:
receive, by the virtual switch from a cloud orchestrator, the configuration information for establishing the second virtual machine as the endpoint of the direct tunnel,
wherein the cloud orchestrator includes at least one of a virtual switch controller, a cloud manager, or a hypervisor manager.
15. The non-transitory computer-readable storage medium of claim 14, wherein the configuration information, the one or more security policies, the request, and the reply are transceived via a control tunnel.
16. The non-transitory computer-readable storage medium of claim 12, wherein the virtual switch is connected to a second virtual switch, the first virtual machine is directly connected to the virtual switch, and the second virtual machine is directly connected to the second virtual switch.
17. A system comprising:
one or more processors; and
memory including instructions that, upon being executed by the one or more processors, cause the system to:
receive, by a first virtual machine from a virtual switch, one or more security policies corresponding to the first virtual machine;
add, by the first virtual machine, one or more entries to an ingress security policy table of the first virtual machine based at least in part on the one or more security policies;
receive, by the first virtual machine from a second virtual machine, a request to connect to the first virtual machine via a direct tunnel, the request including second security information of the second virtual machine and second authentication information of the second virtual machine derived from first security information of the first virtual machine;
establish the first virtual machine as a first endpoint for the direct tunnel;
send, from the first virtual machine to the second virtual machine, a reply that includes first authentication information of the first virtual machine derived from the second security information of the second virtual machine;
send first network traffic from the first virtual machine to the second virtual machine via the direct tunnel; and
receive second network traffic by the first virtual machine from the second virtual machine via the direct tunnel.
18. The system of claim 17, wherein the instructions upon being executed further cause the system to:
receive, by the second virtual machine from the virtual switch via a tunnel that includes a hop over the virtual switch, configuration information for establishing the first virtual machine as the first endpoint of the direct tunnel, the configuration information including the first security information of the first virtual machine;
send, from the second virtual machine to the first virtual machine, the request to connect to the first virtual machine via the direct tunnel;
receive the reply by the second virtual machine from the first virtual machine;
establish the second virtual machine as a second endpoint of the direct tunnel;
receive the first network traffic by the second virtual machine from the first virtual machine via the direct tunnel; and
send the second network traffic from the second virtual machine to the first virtual machine via the direct tunnel.
19. The system of claim 18, wherein the instructions upon being executed further cause the system to:
add an entry to an egress forwarding policy table of the second virtual machine to forward network traffic destined for the first virtual machine via the direct tunnel.
20. The system of claim 17, wherein the instructions upon being executed further cause the system to:
add a first entry to the ingress security policy table of the first virtual machine to allow network traffic originating from the second virtual machine via the direct tunnel; and
add an entry to an egress forwarding policy table of the first virtual machine to forward network traffic destined for the second virtual machine via the direct tunnel.
US14/876,627 2015-10-06 2015-10-06 Policy-driven switch overlay bypass in a hybrid cloud network environment Active 2037-03-22 US11005682B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US14/876,627 US11005682B2 (en) 2015-10-06 2015-10-06 Policy-driven switch overlay bypass in a hybrid cloud network environment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US14/876,627 US11005682B2 (en) 2015-10-06 2015-10-06 Policy-driven switch overlay bypass in a hybrid cloud network environment

Publications (2)

Publication Number Publication Date
US20170099188A1 true US20170099188A1 (en) 2017-04-06
US11005682B2 US11005682B2 (en) 2021-05-11

Family

ID=58446911

Family Applications (1)

Application Number Title Priority Date Filing Date
US14/876,627 Active 2037-03-22 US11005682B2 (en) 2015-10-06 2015-10-06 Policy-driven switch overlay bypass in a hybrid cloud network environment

Country Status (1)

Country Link
US (1) US11005682B2 (en)

Cited By (121)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170085473A1 (en) * 2014-06-03 2017-03-23 Huawei Technologies Co., Ltd. OPENFLOW Communication Method and System, Controller, and Service Gateway
US20170171298A1 (en) * 2015-12-09 2017-06-15 Intel Corporation Enhanced virtual switch for network function virtualization
US20180007123A1 (en) * 2016-06-30 2018-01-04 Alibaba Group Holding Limited Express route transmissions between virtual machines and cloud service computing devices
CN107547258A (en) * 2017-07-18 2018-01-05 新华三云计算技术有限公司 The implementation method and device of a kind of network strategy
US9935894B2 (en) 2014-05-08 2018-04-03 Cisco Technology, Inc. Collaborative inter-service scheduling of logical resources in cloud platforms
US10034201B2 (en) 2015-07-09 2018-07-24 Cisco Technology, Inc. Stateless load-balancing across multiple tunnels
US10037617B2 (en) 2015-02-27 2018-07-31 Cisco Technology, Inc. Enhanced user interface systems including dynamic context selection for cloud-based networks
US10050862B2 (en) 2015-02-09 2018-08-14 Cisco Technology, Inc. Distributed application framework that uses network and application awareness for placing data
US10067780B2 (en) 2015-10-06 2018-09-04 Cisco Technology, Inc. Performance-based public cloud selection for a hybrid cloud environment
US10084703B2 (en) 2015-12-04 2018-09-25 Cisco Technology, Inc. Infrastructure-exclusive service forwarding
US20180278478A1 (en) * 2017-03-24 2018-09-27 Cisco Technology, Inc. Network Agent For Generating Platform Specific Network Policies
US10122605B2 (en) 2014-07-09 2018-11-06 Cisco Technology, Inc Annotation of network activity through different phases of execution
US10129177B2 (en) 2016-05-23 2018-11-13 Cisco Technology, Inc. Inter-cloud broker for hybrid cloud networks
US10142346B2 (en) 2016-07-28 2018-11-27 Cisco Technology, Inc. Extension of a private cloud end-point group to a public cloud
US10205677B2 (en) 2015-11-24 2019-02-12 Cisco Technology, Inc. Cloud resource placement optimization and migration execution in federated clouds
US10212074B2 (en) 2011-06-24 2019-02-19 Cisco Technology, Inc. Level of hierarchy in MST for traffic localization and load balancing
US10257042B2 (en) 2012-01-13 2019-04-09 Cisco Technology, Inc. System and method for managing site-to-site VPNs of a cloud managed network
US10263898B2 (en) 2016-07-20 2019-04-16 Cisco Technology, Inc. System and method for implementing universal cloud classification (UCC) as a service (UCCaaS)
US10320683B2 (en) 2017-01-30 2019-06-11 Cisco Technology, Inc. Reliable load-balancer using segment routing and real-time application monitoring
US10326817B2 (en) 2016-12-20 2019-06-18 Cisco Technology, Inc. System and method for quality-aware recording in large scale collaborate clouds
US10334029B2 (en) 2017-01-10 2019-06-25 Cisco Technology, Inc. Forming neighborhood groups from disperse cloud providers
US10341371B2 (en) 2016-08-31 2019-07-02 Nicira, Inc. Identifying and handling threats to data compute nodes in public cloud
US10353800B2 (en) 2017-10-18 2019-07-16 Cisco Technology, Inc. System and method for graph based monitoring and management of distributed systems
US20190222574A1 (en) * 2018-01-17 2019-07-18 Vmware, Inc. Automating establishment of initial mutual trust during deployment of a virtual appliance in a managed virtual data center environment
US10367757B2 (en) 2016-08-27 2019-07-30 Nicira, Inc. Extension of network control system into public cloud
US10367914B2 (en) 2016-01-12 2019-07-30 Cisco Technology, Inc. Attaching service level agreements to application containers and enabling service assurance
US10382274B2 (en) 2017-06-26 2019-08-13 Cisco Technology, Inc. System and method for wide area zero-configuration network auto configuration
US10382534B1 (en) 2015-04-04 2019-08-13 Cisco Technology, Inc. Selective load balancing of network traffic
US10382597B2 (en) 2016-07-20 2019-08-13 Cisco Technology, Inc. System and method for transport-layer level identification and isolation of container traffic
US10419330B2 (en) 2016-07-21 2019-09-17 Alibaba Group Holding Limited Express route transmissions between virtual machines and cloud service computing devices
US10425288B2 (en) 2017-07-21 2019-09-24 Cisco Technology, Inc. Container telemetry in data center environments with blade servers and switches
US20190297072A1 (en) * 2018-03-26 2019-09-26 Nicira, Inc. System and method for authentication in a public cloud
US10432532B2 (en) 2016-07-12 2019-10-01 Cisco Technology, Inc. Dynamically pinning micro-service to uplink port
US10432450B2 (en) * 2016-06-30 2019-10-01 Microsoft Technology Licensing, Llc. Data plane API in a distributed computing network
US10439877B2 (en) 2017-06-26 2019-10-08 Cisco Technology, Inc. Systems and methods for enabling wide area multicast domain name system
US20190312909A1 (en) * 2018-04-09 2019-10-10 Nicira, Inc. Method and system for applying compliance policies on private and public cloud
US10454984B2 (en) 2013-03-14 2019-10-22 Cisco Technology, Inc. Method for streaming packet captures from network access devices to a cloud server over HTTP
US10462136B2 (en) 2015-10-13 2019-10-29 Cisco Technology, Inc. Hybrid cloud security groups
US10461959B2 (en) 2014-04-15 2019-10-29 Cisco Technology, Inc. Programmable infrastructure gateway for enabling hybrid cloud services in a network environment
US10476982B2 (en) 2015-05-15 2019-11-12 Cisco Technology, Inc. Multi-datacenter message queue
US10491516B2 (en) 2017-08-24 2019-11-26 Nicira, Inc. Packet communication between logical networks and public cloud service providers native networks using a single network interface and a single routing table
US10491466B1 (en) 2018-08-24 2019-11-26 Vmware, Inc. Intelligent use of peering in public cloud
US10511534B2 (en) 2018-04-06 2019-12-17 Cisco Technology, Inc. Stateless distributed load-balancing
US10523657B2 (en) 2015-11-16 2019-12-31 Cisco Technology, Inc. Endpoint privacy preservation with cloud conferencing
CN110636115A (en) * 2019-08-29 2019-12-31 平安医疗健康管理股份有限公司 Cross-cloud service calling processing method, gateway server and requester server
US10523592B2 (en) 2016-10-10 2019-12-31 Cisco Technology, Inc. Orchestration system for migrating user data and services based on user information
US10541866B2 (en) 2017-07-25 2020-01-21 Cisco Technology, Inc. Detecting and resolving multicast traffic performance issues
US10552191B2 (en) 2017-01-26 2020-02-04 Cisco Technology, Inc. Distributed hybrid cloud orchestration model
US20200053050A1 (en) * 2018-08-10 2020-02-13 Microsoft Technology Licensing, Llc Virtual switch bypass
US10567344B2 (en) 2016-08-23 2020-02-18 Cisco Technology, Inc. Automatic firewall configuration based on aggregated cloud managed information
US10567482B2 (en) 2017-08-24 2020-02-18 Nicira, Inc. Accessing endpoints in logical networks and public cloud service providers native networks using a single network interface and a single routing table
US20200067733A1 (en) * 2018-08-24 2020-02-27 Vmware, Inc. Transitive routing in public cloud
US10601705B2 (en) 2017-12-04 2020-03-24 Nicira, Inc. Failover of centralized routers in public cloud logical networks
US10601693B2 (en) 2017-07-24 2020-03-24 Cisco Technology, Inc. System and method for providing scalable flow monitoring in a data center fabric
US10608865B2 (en) 2016-07-08 2020-03-31 Cisco Technology, Inc. Reducing ARP/ND flooding in cloud environment
CN111049925A (en) * 2019-12-20 2020-04-21 网易(杭州)网络有限公司 Hybrid cloud network system, communication system and communication method
CN111130974A (en) * 2018-11-01 2020-05-08 深信服科技股份有限公司 Network intercommunication system and method based on multi-cloud environment
CN111124659A (en) * 2018-11-01 2020-05-08 深信服科技股份有限公司 Heterogeneous cloud network intercommunication system and method
CN111130975A (en) * 2018-11-01 2020-05-08 深信服科技股份有限公司 Hybrid cloud network intercommunication system and method
CN111225071A (en) * 2018-11-23 2020-06-02 深信服科技股份有限公司 Cloud platform and cross-cloud platform network intercommunication system and method
US10671571B2 (en) 2017-01-31 2020-06-02 Cisco Technology, Inc. Fast network performance in containerized environments for network function virtualization
WO2020135221A1 (en) * 2018-12-28 2020-07-02 Alibaba Group Holding Limited Method, apparatus, and computer-readable storage medium for network optimization for accessing cloud service from on-premises network
US10708342B2 (en) 2015-02-27 2020-07-07 Cisco Technology, Inc. Dynamic troubleshooting workspaces for cloud and network management systems
US10705882B2 (en) 2017-12-21 2020-07-07 Cisco Technology, Inc. System and method for resource placement across clouds for data intensive workloads
CN111385180A (en) * 2018-12-28 2020-07-07 中国移动通信集团重庆有限公司 Communication tunnel construction method, device, equipment and medium
CN111404801A (en) * 2020-03-27 2020-07-10 四川虹美智能科技有限公司 Data processing method, device and system for cross-cloud manufacturer
US10715597B2 (en) 2017-06-16 2020-07-14 At&T Intellectual Property I, L.P. Methods and systems to create a network-agnostic SDN-based cloud gateway for connectivity to multiple cloud service providers
US10728361B2 (en) 2018-05-29 2020-07-28 Cisco Technology, Inc. System for association of customer information across subscribers
US20200252234A1 (en) * 2019-01-31 2020-08-06 Juniper Networks, Inc. Policy-driven on-demand tunnel creation/deletion based on traffic information in a wide area network (wan)
US10764266B2 (en) 2018-06-19 2020-09-01 Cisco Technology, Inc. Distributed authentication and authorization for rapid scaling of containerized services
US10785029B2 (en) * 2018-10-31 2020-09-22 Nutanix, Inc. Systems and methods for pairing on-premise clusters to clouds using identity service providers
US10805235B2 (en) 2014-09-26 2020-10-13 Cisco Technology, Inc. Distributed application framework for prioritizing network traffic using application priority awareness
US10819571B2 (en) 2018-06-29 2020-10-27 Cisco Technology, Inc. Network traffic optimization using in-situ notification system
US10862753B2 (en) 2017-12-04 2020-12-08 Nicira, Inc. High availability for stateful services in public cloud logical networks
US10887382B2 (en) 2018-12-18 2021-01-05 Storage Engine, Inc. Methods, apparatuses and systems for cloud-based disaster recovery
US10892940B2 (en) 2017-07-21 2021-01-12 Cisco Technology, Inc. Scalable statistics and analytics mechanisms in cloud networking
US10904342B2 (en) 2018-07-30 2021-01-26 Cisco Technology, Inc. Container networking using communication tunnels
US10904322B2 (en) 2018-06-15 2021-01-26 Cisco Technology, Inc. Systems and methods for scaling down cloud-based servers handling secure connections
WO2021043314A1 (en) * 2019-09-06 2021-03-11 华为技术有限公司 Communication method for hybrid cloud environment, gateway, and management method and apparatus
US10958720B2 (en) 2018-12-18 2021-03-23 Storage Engine, Inc. Methods, apparatuses and systems for cloud based disaster recovery
US20210092103A1 (en) * 2018-10-02 2021-03-25 Arista Networks, Inc. In-line encryption of network data
US10963283B2 (en) * 2018-12-27 2021-03-30 Nutanix, Inc. Configuration management for hybrid cloud
US10983886B2 (en) 2018-12-18 2021-04-20 Storage Engine, Inc. Methods, apparatuses and systems for cloud-based disaster recovery
US11005731B2 (en) 2017-04-05 2021-05-11 Cisco Technology, Inc. Estimating model parameters for automatic deployment of scalable micro services
US11012507B2 (en) * 2016-08-29 2021-05-18 Vmware, Inc. High throughput layer 2 extension leveraging CPU flow affinity
US11019083B2 (en) 2018-06-20 2021-05-25 Cisco Technology, Inc. System for coordinating distributed website analysis
US11044162B2 (en) 2016-12-06 2021-06-22 Cisco Technology, Inc. Orchestration of cloud and fog interactions
US11050586B2 (en) * 2016-09-26 2021-06-29 Huawei Technologies Co., Ltd. Inter-cloud communication method and related device, and inter-cloud communication configuration method and related device
US11057350B2 (en) * 2019-05-30 2021-07-06 Cisco Technology, Inc. Layer 2 mobility for hybrid multi-cloud deployments without host-overlay
US11063903B2 (en) * 2018-04-11 2021-07-13 Vmware, Inc. Port and loopback IP addresses allocation scheme for full-mesh communications with transparent TLS tunnels
US11093271B2 (en) 2016-03-18 2021-08-17 Airwatch Llc Enforcing compliance rules using host management components
US11128490B2 (en) 2019-04-26 2021-09-21 Microsoft Technology Licensing, Llc Enabling access to dedicated resources in a virtual network using top of rack switches
US11159419B1 (en) 2021-01-29 2021-10-26 Netskope, Inc. Policy-driven data locality and residency
CN113595846A (en) * 2021-07-20 2021-11-02 重庆长安汽车股份有限公司 Method for realizing communication of GRE tunnel in cloud-to-cloud environment
US11178221B2 (en) 2018-12-18 2021-11-16 Storage Engine, Inc. Methods, apparatuses and systems for cloud-based disaster recovery
US11176002B2 (en) 2018-12-18 2021-11-16 Storage Engine, Inc. Methods, apparatuses and systems for cloud-based disaster recovery
US11196591B2 (en) 2018-08-24 2021-12-07 Vmware, Inc. Centralized overlay gateway in public cloud
US11252019B2 (en) 2018-12-18 2022-02-15 Storage Engine, Inc. Methods, apparatuses and systems for cloud-based disaster recovery
CN114175583A (en) * 2019-07-29 2022-03-11 思科技术公司 System resource management in self-healing networks
US11310117B2 (en) 2020-06-24 2022-04-19 Red Hat, Inc. Pairing of a probe entity with another entity in a cloud computing environment
CN114500171A (en) * 2021-12-29 2022-05-13 曙光云计算集团有限公司 Network system and message transmission method
US11343229B2 (en) 2018-06-28 2022-05-24 Vmware, Inc. Managed forwarding element detecting invalid packet addresses
US11349802B2 (en) * 2017-04-04 2022-05-31 Samsung Electronics Co., Ltd. Device and method for setting transmission rules of data packet in software defined network
US20220174042A1 (en) * 2018-09-21 2022-06-02 Google Llc Network Architecture for Cloud Computing Environments
EP3836487A4 (en) * 2018-08-07 2022-06-29 Sangfor Technologies Inc. Internet access behavior management system, device and method
US20220263892A1 (en) * 2017-08-31 2022-08-18 Oracle International Corporation System and method for supporting heterogeneous and asymmetric dual rail fabric configurations in a high performance computing environment
US20220294698A1 (en) * 2019-09-04 2022-09-15 Telefonaktiebolaget Lm Ericsson (Publ) Edge Cloud Anchoring
US11481362B2 (en) 2017-11-13 2022-10-25 Cisco Technology, Inc. Using persistent memory to enable restartability of bulk load transactions in cloud databases
US11489730B2 (en) 2018-12-18 2022-11-01 Storage Engine, Inc. Methods, apparatuses and systems for configuring a network environment for a server
US11563601B1 (en) 2019-08-22 2023-01-24 Juniper Networks, Inc. Proactive tunnel configuration computation for on-demand SD-WAN tunnels
US11595474B2 (en) 2017-12-28 2023-02-28 Cisco Technology, Inc. Accelerating data replication using multicast and non-volatile memory enabled nodes
US20230117052A1 (en) * 2021-10-19 2023-04-20 Yokogawa Electric Corporation Control system, control method, and non-transitory computer readable storage medium
US11695697B2 (en) 2017-08-27 2023-07-04 Nicira, Inc. Performing in-line service in public cloud
US20230300612A1 (en) * 2020-06-28 2023-09-21 Zte Corporation 5g authentication method, 5g account opening method and system, and electronic device and computer-readable storage medium
US11930045B1 (en) * 2023-04-28 2024-03-12 Snowflake Inc. Secure network access from sandboxed applications
US12034773B2 (en) 2021-03-23 2024-07-09 Oracle International Corporation Policy engine for governing cloud environments
US20240414210A1 (en) * 2023-06-09 2024-12-12 Fortinet, Inc. Systems and methods for edge processing using selectively suspended network security
US20250097148A1 (en) * 2023-09-19 2025-03-20 Cisco Technology, Inc. Service routing using ip encapsulation
US12335117B2 (en) * 2016-09-28 2025-06-17 Amazon Technologies, Inc. Visualization of network health information
US12348634B1 (en) * 2023-12-27 2025-07-01 University Of Sharjah Framework for storage and verification of academic credentials on blockchain technology
US12363035B2 (en) 2021-09-29 2025-07-15 Juniper Networks, Inc. Opportunistic mesh for software-defined wide area network (SD-WAN)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11671430B2 (en) 2021-05-26 2023-06-06 Netskope, Inc. Secure communication session using encryption protocols and digitally segregated secure tunnels

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110261828A1 (en) * 2010-04-27 2011-10-27 Cisco Technology, Inc. Virtual switching overlay for cloud computing
US20130232491A1 (en) * 2008-06-13 2013-09-05 Netapp Inc. Virtual machine communication
US20130232492A1 (en) * 2010-10-19 2013-09-05 Zte Corporation Method and system for realizing virtual machine mobility
US20130268643A1 (en) * 2012-04-05 2013-10-10 Cisco Technology, Inc. System and method for migrating application virtual machines in a network environment
US8909780B1 (en) * 2012-05-24 2014-12-09 Amazon Technologies, Inc. Connection following during network reconfiguration
US20150063102A1 (en) * 2013-08-30 2015-03-05 Cisco Technology, Inc. Flow Based Network Service Insertion
US20160188527A1 (en) * 2014-12-29 2016-06-30 Vmware, Inc. Methods and systems to achieve multi-tenancy in rdma over converged ethernet
US20170054659A1 (en) * 2015-08-20 2017-02-23 Intel Corporation Techniques for routing packets between virtual machines

Family Cites Families (402)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5889896A (en) 1994-02-09 1999-03-30 Meshinsky; John System for performing multiple processes on images of scanned documents
US5812773A (en) 1996-07-12 1998-09-22 Microsoft Corporation System and method for the distribution of hierarchically structured data
US6108782A (en) 1996-12-13 2000-08-22 3Com Corporation Distributed remote monitoring (dRMON) for networks
US6091705A (en) 1996-12-20 2000-07-18 Sebring Systems, Inc. Method and apparatus for a fault tolerant, software transparent and high data integrity extension to a backplane bus or interconnect
US6178453B1 (en) 1997-02-18 2001-01-23 Netspeak Corporation Virtual circuit switching architecture
US6298153B1 (en) 1998-01-16 2001-10-02 Canon Kabushiki Kaisha Digital signature method and information communication system and apparatus using such method
US6735631B1 (en) 1998-02-10 2004-05-11 Sprint Communications Company, L.P. Method and system for networking redirecting
US20020004900A1 (en) 1998-09-04 2002-01-10 Baiju V. Patel Method for secure anonymous communication
US6643260B1 (en) 1998-12-18 2003-11-04 Cisco Technology, Inc. Method and apparatus for implementing a quality of service policy in a data communications network
US20040095237A1 (en) 1999-01-09 2004-05-20 Chen Kimball C. Electronic message delivery system utilizable in the monitoring and control of remote equipment and method of same
ATE277378T1 (en) 1999-10-25 2004-10-15 Texas Instruments Inc INTELLIGENT POWER CONTROL IN DISTRIBUTED PROCESSING SYSTEMS
US6707794B1 (en) 1999-11-15 2004-03-16 Networks Associates Technology, Inc. Method, system and computer program product for physical link layer handshake protocol analysis
US6343290B1 (en) 1999-12-22 2002-01-29 Celeritas Technologies, L.L.C. Geographic network management system
US6683873B1 (en) 1999-12-27 2004-01-27 Cisco Technology, Inc. Methods and apparatus for redirecting network traffic
JP4162347B2 (en) 2000-01-31 2008-10-08 富士通株式会社 Network system
US7058706B1 (en) 2000-03-31 2006-06-06 Akamai Technologies, Inc. Method and apparatus for determining latency between multiple servers and a client
US6721804B1 (en) 2000-04-07 2004-04-13 Danger, Inc. Portal system for converting requested data into a bytecode format based on portal device's graphical capabilities
WO2001092572A1 (en) 2000-06-01 2001-12-06 Nisshinbo Industries, Inc. Kit and method for determining hla type
US7917647B2 (en) 2000-06-16 2011-03-29 Mcafee, Inc. Method and apparatus for rate limiting
US7062571B1 (en) 2000-06-30 2006-06-13 Cisco Technology, Inc. Efficient IP load-balancing traffic distribution using ternary CAMs
US7051078B1 (en) 2000-07-10 2006-05-23 Cisco Technology, Inc. Hierarchical associative memory-based classification system
AU2001288463A1 (en) 2000-08-30 2002-03-13 Citibank, N.A. Method and system for internet hosting and security
US7596784B2 (en) 2000-09-12 2009-09-29 Symantec Operating Corporation Method system and apparatus for providing pay-per-use distributed computing resources
US6996615B1 (en) 2000-09-29 2006-02-07 Cisco Technology, Inc. Highly scalable least connections load balancing
US7054930B1 (en) 2000-10-26 2006-05-30 Cisco Technology, Inc. System and method for propagating filters
US20020143928A1 (en) 2000-12-07 2002-10-03 Maltz David A. Method and system for collection and storage of traffic data in a computer network
US7065482B2 (en) 2001-05-17 2006-06-20 International Business Machines Corporation Internet traffic analysis tool
US7002965B1 (en) 2001-05-21 2006-02-21 Cisco Technology, Inc. Method and apparatus for using ternary and binary content-addressable memory stages to classify packets
US6963913B2 (en) 2001-06-11 2005-11-08 Bluefire Security Technologies, Inc. Packet filtering system and methods
US7212490B1 (en) 2001-07-06 2007-05-01 Cisco Technology, Inc. Dynamic load balancing for dual ring topology networks
US7028098B2 (en) 2001-07-20 2006-04-11 Nokia, Inc. Selective routing of data flows using a TCAM
JP2003345612A (en) 2002-05-28 2003-12-05 Sony Corp Arithmetic processing system, task control method on computer system, and computer program
US8103755B2 (en) 2002-07-02 2012-01-24 Arbor Networks, Inc. Apparatus and method for managing a provider network
US7313667B1 (en) 2002-08-05 2007-12-25 Cisco Technology, Inc. Methods and apparatus for mapping fields of entries into new values and combining these mapped values into mapped entries for use in lookup operations such as for packet processing
US20040131059A1 (en) 2002-09-19 2004-07-08 Ram Ayyakad Single-pass packet scan
US7076397B2 (en) 2002-10-17 2006-07-11 Bmc Software, Inc. System and method for statistical performance monitoring
US7536476B1 (en) 2002-12-20 2009-05-19 Cisco Technology, Inc. Method for performing tree based ACL lookups
US6733449B1 (en) 2003-03-20 2004-05-11 Siemens Medical Solutions Usa, Inc. System and method for real-time streaming of ultrasound data to a diagnostic medical ultrasound streaming application
US7567504B2 (en) 2003-06-30 2009-07-28 Microsoft Corporation Network load balancing with traffic routing
US20050060418A1 (en) 2003-09-17 2005-03-17 Gennady Sorokopud Packet classification
US7474653B2 (en) 2003-12-05 2009-01-06 Hewlett-Packard Development Company, L.P. Decision cache using multi-key lookup
US7496661B1 (en) 2004-03-29 2009-02-24 Packeteer, Inc. Adaptive, application-aware selection of differentiated network services
KR20070037581A (en) 2004-06-25 2007-04-05 코닌클리케 필립스 일렉트로닉스 엔.브이. Anonymity Certificate with Anonymity Certificate Show
US7379846B1 (en) 2004-06-29 2008-05-27 Sun Microsystems, Inc. System and method for automated problem diagnosis
US7684322B2 (en) 2004-07-01 2010-03-23 Nortel Networks Limited Flow admission control in an IP network
US20060059558A1 (en) 2004-09-15 2006-03-16 John Selep Proactive containment of network security attacks
US7881957B1 (en) 2004-11-16 2011-02-01 Amazon Technologies, Inc. Identifying tasks for task performers based on task subscriptions
WO2006058065A2 (en) 2004-11-23 2006-06-01 Nighthawk Radiology Services Methods and systems for providing data across a network
US7711158B2 (en) 2004-12-04 2010-05-04 Electronics And Telecommunications Research Institute Method and apparatus for classifying fingerprint image quality, and fingerprint image recognition system using the same
US7548562B2 (en) 2004-12-14 2009-06-16 Agilent Technologies, Inc. High speed acquisition system that allows capture from a packet network and streams the data to a storage medium
US20060146825A1 (en) 2004-12-30 2006-07-06 Padcom, Inc. Network based quality of service
US7808897B1 (en) 2005-03-01 2010-10-05 International Business Machines Corporation Fast network security utilizing intrusion prevention systems
WO2006112980A2 (en) 2005-03-16 2006-10-26 Cluster Resources, Inc. Reserving resources in an on-demand compute environment from a local compute environment
US9015324B2 (en) 2005-03-16 2015-04-21 Adaptive Computing Enterprises, Inc. System and method of brokering cloud computing resources
US20110016214A1 (en) 2009-07-15 2011-01-20 Cluster Resources, Inc. System and method of brokering cloud computing resources
US7480672B2 (en) 2005-03-31 2009-01-20 Sap Ag Multiple log queues in a database management system
US7606147B2 (en) 2005-04-13 2009-10-20 Zeugma Systems Inc. Application aware traffic shaping service node positioned between the access and core networks
US9065727B1 (en) 2012-08-31 2015-06-23 Google Inc. Device identifier similarity models derived from online event signals
US7464303B2 (en) 2005-06-09 2008-12-09 International Business Machines Corporation Autonomically adjusting configuration parameters for a server when a different server fails
US7716335B2 (en) 2005-06-27 2010-05-11 Oracle America, Inc. System and method for automated workload characterization of an application server
US7607043B2 (en) 2006-01-04 2009-10-20 International Business Machines Corporation Analysis of mutually exclusive conflicts among redundant devices
US7613955B2 (en) 2006-01-06 2009-11-03 Microsoft Corporation Collecting debug data from a wireless device
US8028071B1 (en) 2006-02-15 2011-09-27 Vmware, Inc. TCP/IP offload engine virtualization system and methods
US8040895B2 (en) 2006-03-22 2011-10-18 Cisco Technology, Inc. Method and system for removing dead access control entries (ACEs)
US7778183B2 (en) 2006-03-31 2010-08-17 International Business Machines Corporation Data replica selector
US20090019367A1 (en) 2006-05-12 2009-01-15 Convenos, Llc Apparatus, system, method, and computer program product for collaboration via one or more networks
US7761596B2 (en) 2006-06-30 2010-07-20 Telefonaktiebolaget L M Ericsson (Publ) Router and method for server load balancing
US8533687B1 (en) 2009-11-30 2013-09-10 dynaTrade Software GmbH Methods and system for global real-time transaction tracing
US8194664B2 (en) 2006-10-10 2012-06-05 Cisco Technology, Inc. Two-level load-balancing of network traffic over an MPLS network
JP4333736B2 (en) 2006-12-19 2009-09-16 村田機械株式会社 Relay server and client terminal
US7653063B2 (en) 2007-01-05 2010-01-26 Cisco Technology, Inc. Source address binding check
US8103773B2 (en) 2007-01-19 2012-01-24 Cisco Technology, Inc. Transactional application processing in a distributed environment
US20080201455A1 (en) 2007-02-15 2008-08-21 Husain Syed M Amir Moving Execution of a Virtual Machine Across Different Virtualization Platforms
US8406141B1 (en) 2007-03-12 2013-03-26 Cybertap, Llc Network search methods and systems
US7853998B2 (en) 2007-03-22 2010-12-14 Mocana Corporation Firewall propagation
US7773510B2 (en) 2007-05-25 2010-08-10 Zeugma Systems Inc. Application routing in a distributed compute environment
US9678803B2 (en) 2007-06-22 2017-06-13 Red Hat, Inc. Migration of network entities to a cloud infrastructure
US9495152B2 (en) 2007-06-22 2016-11-15 Red Hat, Inc. Automatic baselining of business application service groups comprised of virtual machines
US8301740B2 (en) 2007-06-27 2012-10-30 Ca, Inc. Autonomic control of a distributed computing system using dynamically assembled resource chains
US20090010277A1 (en) 2007-07-03 2009-01-08 Eran Halbraich Method and system for selecting a recording route in a multi-media recording environment
US8205208B2 (en) 2007-07-24 2012-06-19 Internaitonal Business Machines Corporation Scheduling grid jobs using dynamic grid scheduling policy
US8423470B2 (en) 2007-09-21 2013-04-16 Microsoft Corporation Distributed secure anonymous conferencing
US8284664B1 (en) 2007-09-28 2012-10-09 Juniper Networks, Inc. Redirecting data units to service modules based on service tags and a redirection table
US8121117B1 (en) 2007-10-01 2012-02-21 F5 Networks, Inc. Application layer network traffic prioritization
US8862765B2 (en) 2007-10-18 2014-10-14 Arris Solutions, Inc. Fair bandwidth redistribution algorithm
US8583797B2 (en) 2008-01-07 2013-11-12 Ca, Inc. Interdependent capacity levels of resources in a distributed computing system
US20090178058A1 (en) 2008-01-09 2009-07-09 Microsoft Corporation Application Aware Networking
US8291474B2 (en) 2008-04-16 2012-10-16 Oracle America, Inc. Using opaque groups in a federated identity management environment
US8935692B2 (en) 2008-05-22 2015-01-13 Red Hat, Inc. Self-management of virtual machines in cloud-based networks
US8943497B2 (en) 2008-05-29 2015-01-27 Red Hat, Inc. Managing subscriptions for cloud-based virtual machines
US8171415B2 (en) 2008-06-11 2012-05-01 International Business Machines Corporation Outage management portal leveraging back-end resources to create a role and user tailored front-end interface for coordinating outage responses
US9069599B2 (en) 2008-06-19 2015-06-30 Servicemesh, Inc. System and method for a cloud computing abstraction layer with security zone facilities
US8514868B2 (en) 2008-06-19 2013-08-20 Servicemesh, Inc. Cloud computing gateway, cloud computing hypervisor, and methods for implementing same
US8175103B2 (en) 2008-06-26 2012-05-08 Rockstar Bidco, LP Dynamic networking of virtual machines
US8479192B2 (en) 2008-06-27 2013-07-02 Xerox Corporation Dynamic XPS filter
US8250215B2 (en) 2008-08-12 2012-08-21 Sap Ag Method and system for intelligently leveraging cloud computing resources
US8706878B1 (en) 2008-08-21 2014-04-22 United Services Automobile Association Preferential loading in data centers
WO2010062435A1 (en) 2008-09-04 2010-06-03 Telcordia Technologies, Inc. Computing diagnostic explanations of network faults from monitoring data
US8238256B2 (en) 2008-09-08 2012-08-07 Nugent Raymond M System and method for cloud computing
US8041714B2 (en) 2008-09-15 2011-10-18 Palantir Technologies, Inc. Filter chains with associated views for exploring large data sets
CN101394360B (en) 2008-11-10 2011-07-20 北京星网锐捷网络技术有限公司 Processing method, access device and communication system for address resolution protocol
US9621341B2 (en) 2008-11-26 2017-04-11 Microsoft Technology Licensing, Llc Anonymous verifiable public key certificates
EP2211502A1 (en) 2009-01-22 2010-07-28 IBBT vzw Management system and method for configuring a network for transferring media data
US8566362B2 (en) 2009-01-23 2013-10-22 Nasuni Corporation Method and system for versioned file system using structured data representations
US20120005724A1 (en) 2009-02-09 2012-01-05 Imera Systems, Inc. Method and system for protecting private enterprise resources in a cloud computing environment
US8510735B2 (en) 2009-02-11 2013-08-13 International Business Machines Corporation Runtime environment for virtualizing information technology appliances
US8341427B2 (en) 2009-02-16 2012-12-25 Microsoft Corporation Trusted cloud computing and services framework
US8432919B2 (en) 2009-02-25 2013-04-30 Cisco Technology, Inc. Data stream classification
US9473555B2 (en) 2012-12-31 2016-10-18 The Nielsen Company (Us), Llc Apparatus, system and methods for portable device tracking using temporary privileged access
EP2228719A1 (en) 2009-03-11 2010-09-15 Zimory GmbH Method of executing a virtual machine, computing system and computer program
US8271615B2 (en) 2009-03-31 2012-09-18 Cloud Connex, Llc Centrally managing and monitoring software as a service (SaaS) applications
US8560639B2 (en) 2009-04-24 2013-10-15 Microsoft Corporation Dynamic placement of replica data
US8516106B2 (en) 2009-05-18 2013-08-20 International Business Machines Corporation Use tag clouds to visualize components related to an event
TW201112006A (en) 2009-05-29 2011-04-01 Ibm Computer system, method and program product
US8639787B2 (en) 2009-06-01 2014-01-28 Oracle International Corporation System and method for creating or reconfiguring a virtual server image for cloud deployment
JP5400482B2 (en) 2009-06-04 2014-01-29 株式会社日立製作所 Management computer, resource management method, resource management program, recording medium, and information processing system
US8284776B2 (en) 2009-06-10 2012-10-09 Broadcom Corporation Recursive packet header processing
US20100318609A1 (en) 2009-06-15 2010-12-16 Microsoft Corporation Bridging enterprise networks into cloud
EP2267983B1 (en) 2009-06-22 2018-08-08 Citrix Systems, Inc. System and method for providing link management in a multi-core system
KR101626117B1 (en) 2009-06-22 2016-05-31 삼성전자주식회사 Client, brokerage sever and method for providing cloud storage
US8281149B2 (en) 2009-06-23 2012-10-02 Google Inc. Privacy-preserving flexible anonymous-pseudonymous access
US8244559B2 (en) 2009-06-26 2012-08-14 Microsoft Corporation Cloud computing resource broker
US8849955B2 (en) 2009-06-30 2014-09-30 Commvault Systems, Inc. Cloud storage and networking agents, including agents for utilizing multiple, different cloud storage sites
US8234377B2 (en) 2009-07-22 2012-07-31 Amazon Technologies, Inc. Dynamically migrating computer networks
US8966475B2 (en) 2009-08-10 2015-02-24 Novell, Inc. Workload management for heterogeneous hosts in a computing system environment
US8862720B2 (en) 2009-08-31 2014-10-14 Red Hat, Inc. Flexible cloud management including external clouds
US8510469B2 (en) 2009-08-31 2013-08-13 Cisco Technology, Inc. Measuring attributes of client-server applications
US8271653B2 (en) 2009-08-31 2012-09-18 Red Hat, Inc. Methods and systems for cloud management using multiple cloud management schemes to allow communication between independently controlled clouds
US20110072489A1 (en) 2009-09-23 2011-03-24 Gilad Parann-Nissany Methods, devices, and media for securely utilizing a non-secured, distributed, virtualized network resource with applications to cloud-computing security and management
US8532108B2 (en) 2009-09-30 2013-09-10 Alcatel Lucent Layer 2 seamless site extension of enterprises in cloud computing
JP2011076292A (en) 2009-09-30 2011-04-14 Hitachi Ltd Method for designing failure cause analysis rule in accordance with available device information, and computer
US8880682B2 (en) 2009-10-06 2014-11-04 Emc Corporation Integrated forensics platform for analyzing IT resources consumed to derive operational and architectural recommendations
US20110110382A1 (en) 2009-11-10 2011-05-12 Cisco Technology, Inc., A Corporation Of California Distribution of Packets Among PortChannel Groups of PortChannel Links
US8611356B2 (en) 2009-11-13 2013-12-17 Exalt Communications Incorporated Apparatus for ethernet traffic aggregation of radio links
US20110126197A1 (en) 2009-11-25 2011-05-26 Novell, Inc. System and method for controlling cloud and virtualized data centers in an intelligent workload management system
CN101719930A (en) 2009-11-27 2010-06-02 南京邮电大学 Cloud money-based hierarchical cloud computing system excitation method
GB2475897A (en) 2009-12-04 2011-06-08 Creme Software Ltd Resource allocation using estimated time to complete jobs in a grid or cloud computing environment
US8037187B2 (en) 2009-12-11 2011-10-11 International Business Machines Corporation Resource exchange management within a cloud computing environment
US20130117337A1 (en) 2009-12-23 2013-05-09 Gary M. Dunham Locally Connected Cloud Storage Device
US9959147B2 (en) 2010-01-13 2018-05-01 Vmware, Inc. Cluster configuration through host ranking
US9883008B2 (en) 2010-01-15 2018-01-30 Endurance International Group, Inc. Virtualization of multiple distinct website hosting architectures
WO2011091056A1 (en) 2010-01-19 2011-07-28 Servicemesh, Inc. System and method for a cloud computing abstraction layer
US8301746B2 (en) 2010-01-26 2012-10-30 International Business Machines Corporation Method and system for abstracting non-functional requirements based deployment of virtual machines
US8797866B2 (en) 2010-02-12 2014-08-05 Cisco Technology, Inc. Automatic adjusting of reputation thresholds in order to change the processing of certain packets
US8898457B2 (en) 2010-02-26 2014-11-25 Red Hat, Inc. Automatically generating a certificate operation request
US20110213687A1 (en) 2010-02-26 2011-09-01 James Michael Ferris Systems and methods for or a usage manager for cross-cloud appliances
US9129086B2 (en) 2010-03-04 2015-09-08 International Business Machines Corporation Providing security services within a cloud computing environment
US20110239039A1 (en) 2010-03-26 2011-09-29 Dieffenbach Devon C Cloud computing enabled robust initialization and recovery of it services
US20110252327A1 (en) 2010-03-26 2011-10-13 Actiance, Inc. Methods, systems, and user interfaces for graphical summaries of network activities
US8886806B2 (en) 2010-04-07 2014-11-11 Accenture Global Services Limited Generic control layer in a cloud environment
US8243598B2 (en) 2010-04-26 2012-08-14 International Business Machines Corporation Load-balancing via modulus distribution and TCP flow redirection due to server overload
US8547974B1 (en) 2010-05-05 2013-10-01 Mu Dynamics Generating communication protocol test cases based on network traffic
US8719804B2 (en) 2010-05-05 2014-05-06 Microsoft Corporation Managing runtime execution of applications on cloud computing systems
US9223617B2 (en) 2010-05-06 2015-12-29 Nec Laboratories America, Inc. Methods and systems for migrating networked systems across administrative domains
US8910278B2 (en) 2010-05-18 2014-12-09 Cloudnexa Managing services in a cloud computing environment
CN102255933B (en) 2010-05-20 2016-03-30 中兴通讯股份有限公司 Cloud service intermediary, cloud computing method and cloud system
US8954564B2 (en) 2010-05-28 2015-02-10 Red Hat, Inc. Cross-cloud vendor mapping service in cloud marketplace
US8477610B2 (en) 2010-05-31 2013-07-02 Microsoft Corporation Applying policies to schedule network bandwidth among virtual machines
EP2577539B1 (en) 2010-06-02 2018-12-19 VMware, Inc. Securing customer virtual machines in a multi-tenant cloud
US8352415B2 (en) 2010-06-15 2013-01-08 International Business Machines Corporation Converting images in virtual environments
US8705395B2 (en) 2010-06-15 2014-04-22 Jds Uniphase Corporation Method for time aware inline remote mirroring
US8135979B2 (en) 2010-06-24 2012-03-13 Hewlett-Packard Development Company, L.P. Collecting network-level packets into a data structure in response to an abnormal condition
US9201701B2 (en) 2010-07-16 2015-12-01 Nokia Technologies Oy Method and apparatus for distributing computation closures
US8843832B2 (en) 2010-07-23 2014-09-23 Reh Hat, Inc. Architecture, system and method for a real-time collaboration interface
TWM394537U (en) 2010-08-17 2010-12-11 Chunghwa Telecom Co Ltd A system for providing web cloud integrated services
US8473557B2 (en) 2010-08-24 2013-06-25 At&T Intellectual Property I, L.P. Methods and apparatus to migrate virtual machines between distributive computing networks across a wide area network
US8656023B1 (en) 2010-08-26 2014-02-18 Adobe Systems Incorporated Optimization scheduler for deploying applications on a cloud
US9311158B2 (en) 2010-09-03 2016-04-12 Adobe Systems Incorporated Determining a work distribution model between a client device and a cloud for an application deployed on the cloud
US8539597B2 (en) 2010-09-16 2013-09-17 International Business Machines Corporation Securing sensitive data for cloud computing
US8572241B2 (en) 2010-09-17 2013-10-29 Microsoft Corporation Integrating external and cluster heat map data
US8413145B2 (en) 2010-09-30 2013-04-02 Avaya Inc. Method and apparatus for efficient memory replication for high availability (HA) protection of a virtual machine (VM)
US9128626B2 (en) 2010-10-01 2015-09-08 Peter Chacko Distributed virtual storage cloud architecture and a method thereof
US20120084445A1 (en) 2010-10-05 2012-04-05 Brock Scott L Automatic replication and migration of live virtual machines
EP2439637A1 (en) 2010-10-07 2012-04-11 Deutsche Telekom AG Method and system of providing access to a virtual machine distributed in a hybrid cloud network
US8797867B1 (en) 2010-10-18 2014-08-05 Juniper Networks, Inc. Generating and enforcing a holistic quality of service policy in a network
US8909744B2 (en) 2010-10-20 2014-12-09 Hcl Technologies Limited System and method for transitioning to cloud computing environment
US9075661B2 (en) 2010-10-20 2015-07-07 Microsoft Technology Licensing, Llc Placing objects on hosts using hard and soft constraints
US8407413B1 (en) 2010-11-05 2013-03-26 Netapp, Inc Hardware flow classification for data storage services
US8612615B2 (en) 2010-11-23 2013-12-17 Red Hat, Inc. Systems and methods for identifying usage histories for producing optimized cloud utilization
JP5725812B2 (en) 2010-11-25 2015-05-27 キヤノン株式会社 Document processing apparatus, document processing method, and program
US8560792B2 (en) 2010-12-16 2013-10-15 International Business Machines Corporation Synchronous extent migration protocol for paired storage
US10176018B2 (en) 2010-12-21 2019-01-08 Intel Corporation Virtual core abstraction for cloud computing
US8832111B2 (en) 2010-12-30 2014-09-09 Facebook, Inc. Distributed cache for graph data
US8935383B2 (en) 2010-12-31 2015-01-13 Verisign, Inc. Systems, apparatus, and methods for network data analysis
US8495356B2 (en) 2010-12-31 2013-07-23 International Business Machines Corporation System for securing virtual machine disks on a remote shared storage subsystem
US20120179909A1 (en) 2011-01-06 2012-07-12 Pitney Bowes Inc. Systems and methods for providing individual electronic document secure storage, retrieval and use
US8448171B2 (en) 2011-01-07 2013-05-21 International Business Machines Corporation Communications between virtual machines that have been migrated
US8495252B2 (en) 2011-01-17 2013-07-23 International Business Machines Corporation Implementing PCI-express memory domains for single root virtualized devices
US20120182891A1 (en) 2011-01-19 2012-07-19 Youngseok Lee Packet analysis system and method using hadoop based parallel computation
US9225554B2 (en) 2011-01-26 2015-12-29 Cisco Technology, Inc. Device-health-based dynamic configuration of network management systems suited for network operations
US8619568B2 (en) 2011-02-04 2013-12-31 Cisco Technology, Inc. Reassignment of distributed packet flows
US9009697B2 (en) 2011-02-08 2015-04-14 International Business Machines Corporation Hybrid cloud integrator
US8805951B1 (en) 2011-02-08 2014-08-12 Emc Corporation Virtual machines and cloud storage caching for cloud computing applications
US9063789B2 (en) 2011-02-08 2015-06-23 International Business Machines Corporation Hybrid cloud integrator plug-in components
US20120204187A1 (en) 2011-02-08 2012-08-09 International Business Machines Corporation Hybrid Cloud Workload Management
WO2012115970A2 (en) 2011-02-22 2012-08-30 Fedex Corporate Services, Inc. Systems and methods for geo-staging of sensor data through distributed global (cloud) architecture
US9053580B2 (en) 2011-02-25 2015-06-09 International Business Machines Corporation Data processing environment integration control interface
US8832818B2 (en) 2011-02-28 2014-09-09 Rackspace Us, Inc. Automated hybrid connections between multiple environments in a data center
US20120236716A1 (en) 2011-03-14 2012-09-20 Atheros Communications, Inc. Profile-based quality of service for wireless communication systems
KR101544482B1 (en) 2011-03-15 2015-08-21 주식회사 케이티 Cloud center controlling apparatus and cloud center selecting method of the same
US20140019639A1 (en) 2011-03-31 2014-01-16 Hiroshi Ueno Computer system and communication method
US9100188B2 (en) 2011-04-18 2015-08-04 Bank Of America Corporation Hardware-based root of trust for cloud environments
KR101544485B1 (en) 2011-04-25 2015-08-17 주식회사 케이티 Method and apparatus for selecting a node to place a replica in cloud storage system
US8869244B1 (en) 2011-05-03 2014-10-21 Symantec Corporation Techniques for providing role-based access control using dynamic shared accounts
US8806015B2 (en) 2011-05-04 2014-08-12 International Business Machines Corporation Workload-aware placement in private heterogeneous clouds
US9253252B2 (en) 2011-05-06 2016-02-02 Citrix Systems, Inc. Systems and methods for cloud bridging between intranet resources and cloud resources
CN103650426B (en) 2011-05-06 2016-10-05 思杰系统有限公司 System and method for cloud bridging between public cloud and private cloud
US8977754B2 (en) 2011-05-09 2015-03-10 Metacloud Inc. Composite public cloud, method and system
US8590050B2 (en) 2011-05-11 2013-11-19 International Business Machines Corporation Security compliant data storage management
CN102164091B (en) 2011-05-13 2015-01-21 北京星网锐捷网络技术有限公司 Method for building MAC (Media Access Control) address table and provider edge device
US8719627B2 (en) 2011-05-20 2014-05-06 Microsoft Corporation Cross-cloud computing for capacity management and disaster recovery
US8984104B2 (en) 2011-05-31 2015-03-17 Red Hat, Inc. Self-moving operating system installation in cloud-based network
US9244751B2 (en) 2011-05-31 2016-01-26 Hewlett Packard Enterprise Development Lp Estimating a performance parameter of a job having map and reduce tasks after a failure
US9104460B2 (en) 2011-05-31 2015-08-11 Red Hat, Inc. Inter-cloud live migration of virtualization systems
US8959526B2 (en) 2011-06-09 2015-02-17 Microsoft Corporation Scheduling execution of complementary jobs based on resource usage
US8806003B2 (en) 2011-06-14 2014-08-12 International Business Machines Corporation Forecasting capacity available for processing workloads in a networked computing environment
US8547975B2 (en) 2011-06-28 2013-10-01 Verisign, Inc. Parallel processing for multiple instance real-time monitoring
US8589543B2 (en) 2011-07-01 2013-11-19 Cisco Technology, Inc. Virtual data center monitoring
US8959003B2 (en) 2011-07-07 2015-02-17 International Business Machines Corporation Interactive data visualization for trend analysis
US20130036213A1 (en) 2011-08-02 2013-02-07 Masum Hasan Virtual private clouds
CN107071088B (en) 2011-08-17 2020-06-05 Nicira股份有限公司 Logical L3 routing
WO2013028211A1 (en) 2011-08-19 2013-02-28 Hewlett-Packard Development Company, L.P. Providing a simulation service by a cloud-based infrastructure
US8630291B2 (en) 2011-08-22 2014-01-14 Cisco Technology, Inc. Dynamic multi-path forwarding for shared-media communication networks
US9021077B2 (en) 2011-09-26 2015-04-28 Hitachi, Ltd. Management computer and method for root cause analysis
WO2013048986A1 (en) 2011-09-26 2013-04-04 Knoa Software, Inc. Method, system and program product for allocation and/or prioritization of electronic resources
CN103023762A (en) 2011-09-27 2013-04-03 阿尔卡特朗讯公司 Cloud computing access gateway and method for providing access to cloud provider for user terminal
US9250941B2 (en) 2011-09-30 2016-02-02 Telefonaktiebolaget L M Ericsson (Publ) Apparatus and method for segregating tenant specific data when using MPLS in openflow-enabled cloud computing
US8560663B2 (en) 2011-09-30 2013-10-15 Telefonaktiebolaget L M Ericsson (Publ) Using MPLS for virtual private cloud network isolation in openflow-enabled cloud computing
US20130091557A1 (en) 2011-10-11 2013-04-11 Wheel Innovationz, Inc. System and method for providing cloud-based cross-platform application stores for mobile computing devices
DE102012217202B4 (en) 2011-10-12 2020-06-18 International Business Machines Corporation Method and system for optimizing the placement of virtual machines in cloud computing environments
US9201690B2 (en) 2011-10-21 2015-12-01 International Business Machines Corporation Resource aware scheduling in a distributed computing environment
US8789179B2 (en) 2011-10-28 2014-07-22 Novell, Inc. Cloud protection techniques
US9311160B2 (en) 2011-11-10 2016-04-12 Verizon Patent And Licensing Inc. Elastic cloud networking
US8832249B2 (en) 2011-11-30 2014-09-09 At&T Intellectual Property I, L.P. Methods and apparatus to adjust resource allocation in a distributive computing network
US9916184B2 (en) 2011-12-02 2018-03-13 International Business Machines Corporation Data relocation in global storage cloud environments
US20130152076A1 (en) 2011-12-07 2013-06-13 Cisco Technology, Inc. Network Access Control Policy for Virtual Machine Migration
US9113376B2 (en) 2011-12-09 2015-08-18 Cisco Technology, Inc. Multi-interface mobility
US8694995B2 (en) 2011-12-14 2014-04-08 International Business Machines Corporation Application initiated negotiations for resources meeting a performance parameter in a virtualized computing environment
US8832262B2 (en) 2011-12-15 2014-09-09 Cisco Technology, Inc. Normalizing network performance indexes
US10134056B2 (en) 2011-12-16 2018-11-20 Ebay Inc. Systems and methods for providing information based on location
US8860777B2 (en) 2011-12-22 2014-10-14 Verizon Patent And Licensing Inc. Multi-enterprise video conference service
US8547379B2 (en) 2011-12-29 2013-10-01 Joyent, Inc. Systems, methods, and media for generating multidimensional heat maps
US8555339B2 (en) 2012-01-06 2013-10-08 International Business Machines Corporation Identifying guests in web meetings
US8732291B2 (en) 2012-01-13 2014-05-20 Accenture Global Services Limited Performance interference model for managing consolidated workloads in QOS-aware clouds
US8908698B2 (en) 2012-01-13 2014-12-09 Cisco Technology, Inc. System and method for managing site-to-site VPNs of a cloud managed network
US9336061B2 (en) 2012-01-14 2016-05-10 International Business Machines Corporation Integrated metering of service usage for hybrid clouds
US9529348B2 (en) 2012-01-24 2016-12-27 Emerson Process Management Power & Water Solutions, Inc. Method and apparatus for deploying industrial plant simulators using cloud computing technologies
US9049589B2 (en) 2012-01-27 2015-06-02 Microsoft Technology Licensing, Llc Dynamically adjusting a data usage plan based on data usage statistics
US9967159B2 (en) 2012-01-31 2018-05-08 Infosys Limited Systems and methods for providing decision time brokerage in a hybrid cloud ecosystem
US8660129B1 (en) 2012-02-02 2014-02-25 Cisco Technology, Inc. Fully distributed routing over a user-configured on-demand virtual network for infrastructure-as-a-service (IaaS) on hybrid cloud networks
US9451303B2 (en) 2012-02-27 2016-09-20 The Nielsen Company (Us), Llc Method and system for gathering and computing an audience's neurologically-based reactions in a distributed framework involving remote storage and computing
US10097406B2 (en) 2012-03-19 2018-10-09 Level 3 Communications, Llc Systems and methods for data mobility with a cloud architecture
US9350671B2 (en) 2012-03-22 2016-05-24 Futurewei Technologies, Inc. Supporting software defined networking with application layer traffic optimization
US20130254415A1 (en) 2012-03-26 2013-09-26 F. Brian Fullen Routing requests over a network
EP2645257A3 (en) 2012-03-29 2014-06-18 Prelert Ltd. System and method for visualisation of behaviour within computer infrastructure
FR2988943A1 (en) 2012-03-29 2013-10-04 France Telecom SYSTEM FOR SUPERVISING THE SAFETY OF AN ARCHITECTURE
US9164795B1 (en) 2012-03-30 2015-10-20 Amazon Technologies, Inc. Secure tunnel infrastructure between hosts in a hybrid network environment
US8930747B2 (en) 2012-03-30 2015-01-06 Sungard Availability Services, Lp Private cloud replication and recovery
US9313048B2 (en) 2012-04-04 2016-04-12 Cisco Technology, Inc. Location aware virtual service provisioning in a hybrid cloud environment
US8856339B2 (en) 2012-04-04 2014-10-07 Cisco Technology, Inc. Automatically scaled network overlay with heuristic monitoring in a hybrid cloud environment
US8775576B2 (en) 2012-04-17 2014-07-08 Nimbix, Inc. Reconfigurable cloud computing
US9203784B2 (en) 2012-04-24 2015-12-01 Cisco Technology, Inc. Distributed virtual switch architecture for a hybrid cloud
US8918510B2 (en) 2012-04-27 2014-12-23 Hewlett-Packard Development Company, L. P. Evaluation of cloud computing services
US9223634B2 (en) 2012-05-02 2015-12-29 Cisco Technology, Inc. System and method for simulating virtual machine migration in a network environment
WO2013186870A1 (en) 2012-06-13 2013-12-19 株式会社日立製作所 Service monitoring system and service monitoring method
US9183031B2 (en) 2012-06-19 2015-11-10 Bank Of America Corporation Provisioning of a virtual machine by using a secured zone of a cloud environment
US8938775B1 (en) 2012-06-27 2015-01-20 Amazon Technologies, Inc. Dynamic data loss prevention in a multi-tenant environment
US9215131B2 (en) 2012-06-29 2015-12-15 Cisco Technology, Inc. Methods for exchanging network management messages using UDP over HTTP protocol
US20140006585A1 (en) 2012-06-29 2014-01-02 Futurewei Technologies, Inc. Providing Mobility in Overlay Networks
US8909857B2 (en) 2012-06-29 2014-12-09 Broadcom Corporation Efficient storage of ACL frequent ranges in a ternary memory
US9167050B2 (en) 2012-08-16 2015-10-20 Futurewei Technologies, Inc. Control pool based enterprise policy enabler for controlled cloud access
US20140052877A1 (en) 2012-08-16 2014-02-20 Wenbo Mao Method and apparatus for tenant programmable logical network for multi-tenancy cloud datacenters
US9582221B2 (en) 2012-08-24 2017-02-28 Vmware, Inc. Virtualization-aware data locality in distributed data processing
US10097378B2 (en) 2012-09-07 2018-10-09 Cisco Technology, Inc. Efficient TCAM resource sharing
US9069979B2 (en) 2012-09-07 2015-06-30 Oracle International Corporation LDAP-based multi-tenant in-cloud identity management system
US9047181B2 (en) 2012-09-07 2015-06-02 Splunk Inc. Visualization of data from clusters
US9634922B2 (en) 2012-09-11 2017-04-25 Board Of Regents Of The Nevada System Of Higher Education, On Behalf Of The University Of Nevada, Reno Apparatus, system, and method for cloud-assisted routing
US9383900B2 (en) 2012-09-12 2016-07-05 International Business Machines Corporation Enabling real-time operational environment conformity to an enterprise model
US8924720B2 (en) 2012-09-27 2014-12-30 Intel Corporation Method and system to securely migrate and provision virtual machine images and content
US8850182B1 (en) 2012-09-28 2014-09-30 Shoretel, Inc. Data capture for secure protocols
US9301205B2 (en) 2012-10-04 2016-03-29 Benu Networks, Inc. Application and content awareness for self optimizing networks
US9369371B2 (en) 2012-10-05 2016-06-14 Cisco Technologies, Inc. Method and system for path monitoring using segment routing
US9792004B2 (en) 2012-10-08 2017-10-17 Fisher-Rosemount Systems, Inc. Derived and linked definitions with override
US9251114B1 (en) 2012-10-12 2016-02-02 Egnyte, Inc. Systems and methods for facilitating access to private files using a cloud storage system
US9361192B2 (en) 2012-10-19 2016-06-07 Oracle International Corporation Method and apparatus for restoring an instance of a storage server
US9264478B2 (en) 2012-10-30 2016-02-16 Microsoft Technology Licensing, Llc Home cloud with virtualized input and output roaming over network
US9424228B2 (en) 2012-11-01 2016-08-23 Ezchip Technologies Ltd. High performance, scalable multi chip interconnect
US9442954B2 (en) 2012-11-12 2016-09-13 Datawise Systems Method and apparatus for achieving optimal resource allocation dynamically in a distributed computing environment
US20140140211A1 (en) 2012-11-16 2014-05-22 Cisco Technology, Inc. Classification of traffic for application aware policies in a wireless network
US9398436B2 (en) 2012-11-21 2016-07-19 Acer Incorporated Cloud service for making social connections
US9338101B2 (en) 2012-12-06 2016-05-10 At&T Intellectual Property I, L.P. Advertising network layer reachability information specifying a quality of service for an identified network flow
US9049115B2 (en) 2012-12-13 2015-06-02 Cisco Technology, Inc. Enabling virtual workloads using overlay technologies to interoperate with physical network services
US20150070516A1 (en) 2012-12-14 2015-03-12 Biscotti Inc. Automatic Content Filtering
US9268808B2 (en) 2012-12-31 2016-02-23 Facebook, Inc. Placement policy
US9122510B2 (en) 2013-01-02 2015-09-01 International Business Machines Corporation Querying and managing computing resources in a networked computing environment
CN105144652A (en) 2013-01-24 2015-12-09 惠普发展公司,有限责任合伙企业 Address resolution in software-defined networks
US20140215471A1 (en) 2013-01-28 2014-07-31 Hewlett-Packard Development Company, L.P. Creating a model relating to execution of a job on platforms
US9274818B2 (en) 2013-02-06 2016-03-01 International Business Machines Corporation Reliable and scalable image transfer for data centers with low connectivity using redundancy detection
US9525564B2 (en) 2013-02-26 2016-12-20 Zentera Systems, Inc. Secure virtual network platform for enterprise hybrid cloud computing environments
US9183016B2 (en) 2013-02-27 2015-11-10 Vmware, Inc. Adaptive task scheduling of Hadoop in a virtualized environment
US9251115B2 (en) 2013-03-07 2016-02-02 Citrix Systems, Inc. Dynamic configuration in cloud computing environments
US9027087B2 (en) 2013-03-14 2015-05-05 Rackspace Us, Inc. Method and system for identity-based authentication of virtual machines
US9244775B2 (en) 2013-03-14 2016-01-26 International Business Machines Corporation Reducing reading of database logs by persisting long-running transaction data
US9043439B2 (en) 2013-03-14 2015-05-26 Cisco Technology, Inc. Method for streaming packet captures from network access devices to a cloud server over HTTP
US20140280805A1 (en) 2013-03-14 2014-09-18 Rackspace Us, Inc. Two-Sided Declarative Configuration for Cloud Deployment
US20140282669A1 (en) 2013-03-15 2014-09-18 F. Gavin McMillan Methods and apparatus to identify companion media interaction
US20140280964A1 (en) 2013-03-15 2014-09-18 Gravitant, Inc. Systems, methods and computer readable mediums for implementing cloud service brokerage platform functionalities
US9716634B2 (en) 2013-03-15 2017-07-25 International Business Machines Corporation Fulfillment of cloud service orders
US8954992B2 (en) 2013-03-15 2015-02-10 Lenovo Enterprise Solutions (Singapore) Pte. Ltd. Distributed and scaled-out network switch and packet processing
JP5983484B2 (en) 2013-03-21 2016-08-31 富士通株式会社 Information processing system, control program for controlling information processing apparatus, and control method for information processing system
US9613322B2 (en) 2013-04-02 2017-04-04 Orbis Technologies, Inc. Data center analytics and dashboard
US9438495B2 (en) 2013-04-02 2016-09-06 Amazon Technologies, Inc. Visualization of resources in a data center
US9973375B2 (en) 2013-04-22 2018-05-15 Cisco Technology, Inc. App store portal providing point-and-click deployment of third-party virtualized network functions
US9397929B2 (en) 2013-04-22 2016-07-19 Ciena Corporation Forwarding multicast packets over different layer-2 segments
US9407540B2 (en) 2013-09-06 2016-08-02 Cisco Technology, Inc. Distributed service chaining in a network environment
WO2014177190A1 (en) 2013-04-30 2014-11-06 Telefonaktiebolaget L M Ericsson (Publ) Technique of operating a network node for load balancing
US20140366155A1 (en) 2013-06-11 2014-12-11 Cisco Technology, Inc. Method and system of providing storage services in multiple public clouds
US9621642B2 (en) 2013-06-17 2017-04-11 Telefonaktiebolaget Lm Ericsson (Publ) Methods of forwarding data packets using transient tables and related load balancers
US9535970B2 (en) 2013-06-28 2017-01-03 Sap Se Metric catalog system
US9558056B2 (en) 2013-07-28 2017-01-31 OpsClarity Inc. Organizing network performance metrics into historical anomaly dependency data
US9426060B2 (en) 2013-08-07 2016-08-23 International Business Machines Corporation Software defined network (SDN) switch clusters having layer-3 distributed router functionality
US9401860B2 (en) 2013-08-09 2016-07-26 Citrix Systems, Inc. High performance quality-of-service packet scheduling for multiple packet processing engines
US9311140B2 (en) 2013-08-13 2016-04-12 Vmware, Inc. Method and apparatus for extending local area networks between clouds and migrating virtual machines using static network addresses
US9338223B2 (en) 2013-08-14 2016-05-10 Verizon Patent And Licensing Inc. Private cloud topology management system
US9104334B2 (en) 2013-08-20 2015-08-11 Avago Technologies General Ip (Singapore) Pte. Ltd Performance improvements in input/output operations between a host system and an adapter-coupled cache
US9043576B2 (en) 2013-08-21 2015-05-26 Simplivity Corporation System and method for virtual machine conversion
US9686154B2 (en) 2013-08-21 2017-06-20 International Business Machines Corporation Generating a service-catalog entry from discovered attributes of provisioned virtual machines
US10402194B2 (en) 2013-09-20 2019-09-03 Infosys Limited Systems and methods for extracting cross language dependencies and estimating code change impact in software
US9304804B2 (en) 2013-10-14 2016-04-05 Vmware, Inc. Replicating virtual machines across different virtualization platforms
US20150106805A1 (en) 2013-10-15 2015-04-16 Cisco Technology, Inc. Accelerated instantiation of cloud resource
US9264362B2 (en) 2013-10-17 2016-02-16 Cisco Technology, Inc. Proxy address resolution protocol on a controller device
US9634944B2 (en) 2013-10-24 2017-04-25 Dell Products, Lp Multi-level iSCSI QoS for target differentiated data in DCB networks
US9787586B2 (en) 2013-10-24 2017-10-10 University Of Houston System Location-based network routing
US10146607B2 (en) 2013-11-26 2018-12-04 Anunta Technology Management Services Ltd. Troubleshooting of cloud-based application delivery
KR20150070676A (en) 2013-12-17 2015-06-25 소프팅스 주식회사 Personal Home Cloud Computer System
US10915449B2 (en) 2013-12-19 2021-02-09 Hewlett Packard Enterprise Development Lp Prioritizing data requests based on quality of service
WO2015100656A1 (en) 2013-12-31 2015-07-09 华为技术有限公司 Method and device for implementing virtual machine communication
US9992103B2 (en) 2014-01-24 2018-06-05 Cisco Technology, Inc. Method for providing sticky load balancing
US9529657B2 (en) 2014-02-07 2016-12-27 Oracle International Corporation Techniques for generating diagnostic identifiers to trace events and identifying related diagnostic information
US9678731B2 (en) 2014-02-26 2017-06-13 Vmware, Inc. Methods and apparatus to generate a customized application blueprint
US20150249709A1 (en) 2014-02-28 2015-09-03 Vmware, Inc. Extending cloud storage with private devices
US9253204B2 (en) 2014-03-19 2016-02-02 International Business Machines Corporation Generating accurate preemptive security device policy tuning recommendations
US9722945B2 (en) 2014-03-31 2017-08-01 Microsoft Technology Licensing, Llc Dynamically identifying target capacity when scaling cloud resources
US9591064B2 (en) 2014-03-31 2017-03-07 Verizon Patent And Licensing Inc. Method and apparatus for dynamic provisioning of communication services
US9755858B2 (en) 2014-04-15 2017-09-05 Cisco Technology, Inc. Programmable infrastructure gateway for enabling hybrid cloud services in a network environment
US20150309908A1 (en) 2014-04-29 2015-10-29 Hewlett-Packard Development Company, L.P. Generating an interactive visualization of metrics collected for functional entities
US20150319063A1 (en) 2014-04-30 2015-11-05 Jive Communications, Inc. Dynamically associating a datacenter with a network device
US9473365B2 (en) 2014-05-08 2016-10-18 Cisco Technology, Inc. Collaborative inter-service scheduling of logical resources in cloud platforms
US9483378B2 (en) 2014-05-21 2016-11-01 Dynatrace Llc Method and system for resource monitoring of large-scale, orchestrated, multi process job execution environments
US9582254B2 (en) 2014-05-22 2017-02-28 Oracle International Corporation Generating runtime components
US9426221B2 (en) 2014-06-18 2016-08-23 International Business Machines Corporation Dynamic proximity based networked storage
US10375024B2 (en) 2014-06-20 2019-08-06 Zscaler, Inc. Cloud-based virtual private access systems and methods
US9613078B2 (en) 2014-06-26 2017-04-04 Amazon Technologies, Inc. Multi-database log with multi-item transaction support
US10122605B2 (en) 2014-07-09 2018-11-06 Cisco Technology, Inc Annotation of network activity through different phases of execution
US20160013990A1 (en) 2014-07-09 2016-01-14 Cisco Technology, Inc. Network traffic management using heat maps with actual and planned /estimated metrics
CN105446793B (en) 2014-08-28 2018-08-28 国际商业机器公司 The method and apparatus for migrating fictitious assets
US9825878B2 (en) 2014-09-26 2017-11-21 Cisco Technology, Inc. Distributed application framework for prioritizing network traffic using application priority awareness
US9634928B2 (en) 2014-09-29 2017-04-25 Juniper Networks, Inc. Mesh network of simple nodes with centralized control
US9600337B2 (en) 2014-09-30 2017-03-21 Nimble Storage, Inc. Congestion avoidance in network storage device using dynamic weights
US10834450B2 (en) 2014-09-30 2020-11-10 Nbcuniversal Media, Llc Digital content audience matching and targeting system and method
US10320679B2 (en) 2014-09-30 2019-06-11 Nicira, Inc. Inline load balancing
US20160099847A1 (en) 2014-10-02 2016-04-07 Cisco Technology, Inc. Method for non-disruptive cloud infrastructure software component deployment
US11087263B2 (en) 2014-10-09 2021-08-10 Splunk Inc. System monitoring with key performance indicators from shared base search of machine data
US10592093B2 (en) 2014-10-09 2020-03-17 Splunk Inc. Anomaly detection
US10757170B2 (en) 2014-10-13 2020-08-25 Vmware, Inc. Cross-cloud namespace management for multi-tenant environments
US9558078B2 (en) 2014-10-28 2017-01-31 Microsoft Technology Licensing, Llc Point in time database restore from storage snapshots
CN104320342B (en) 2014-10-29 2017-10-27 新华三技术有限公司 Message forwarding method and device in a kind of transparent interconnection of lots of links internet
US9871745B2 (en) 2014-11-12 2018-01-16 International Business Machines Corporation Automatic scaling of at least one user application to external clouds
KR102255216B1 (en) 2014-11-20 2021-05-24 삼성전자주식회사 Pci device and pci system including the same
US9602544B2 (en) 2014-12-05 2017-03-21 Viasat, Inc. Methods and apparatus for providing a secure overlay network between clouds
US9792245B2 (en) 2014-12-09 2017-10-17 Avago Technologies General Ip (Singapore) Pte. Ltd. Peripheral component interconnect express (PCIe) devices with efficient memory mapping by remapping a plurality of base address registers (BARs)
US9075649B1 (en) 2015-01-26 2015-07-07 Storagecraft Technology Corporation Exposing a proprietary image backup to a hypervisor as a disk file that is bootable by the hypervisor
US10050862B2 (en) 2015-02-09 2018-08-14 Cisco Technology, Inc. Distributed application framework that uses network and application awareness for placing data
US9736063B2 (en) 2015-02-17 2017-08-15 Huawei Technologies Co., Ltd. Service chaining using source routing
WO2016134182A1 (en) 2015-02-18 2016-08-25 Unravel Data Systems, Inc. System and method for analyzing big data activities
US10037617B2 (en) 2015-02-27 2018-07-31 Cisco Technology, Inc. Enhanced user interface systems including dynamic context selection for cloud-based networks
US10708342B2 (en) 2015-02-27 2020-07-07 Cisco Technology, Inc. Dynamic troubleshooting workspaces for cloud and network management systems
US9928377B2 (en) 2015-03-19 2018-03-27 Netskope, Inc. Systems and methods of monitoring and controlling enterprise information stored on a cloud computing service (CCS)
US9432294B1 (en) 2015-03-21 2016-08-30 Cisco Technology, Inc. Utilizing user-specified access control lists in conjunction with redirection and load-balancing on a port
US9954783B1 (en) 2015-03-31 2018-04-24 Cisco Technology, Inc. System and method for minimizing disruption from failed service nodes
US9444744B1 (en) 2015-04-04 2016-09-13 Cisco Technology, Inc. Line-rate selective load balancing of permitted network traffic
US9727359B2 (en) 2015-04-27 2017-08-08 Red Hat Israel, Ltd. Virtual machine function based sub-page base address register access for peripheral component interconnect device assignment
US10554620B2 (en) 2015-05-29 2020-02-04 Cisco Technology, Inc. Default gateway extension
US9542115B1 (en) 2015-06-23 2017-01-10 Netapp, Inc. Methods and systems for trouble shooting performance issues in networked storage systems
US20170024260A1 (en) 2015-07-21 2017-01-26 Cisco Technology, Inc. Workload migration across cloud providers and data centers
US20170026470A1 (en) 2015-07-22 2017-01-26 Cisco Technology, Inc. Intercloud audience and content analytics
US9705909B2 (en) 2015-07-29 2017-07-11 Verizon Digital Media Services Inc. Automatic detection and mitigation of security weaknesses with a self-configuring firewall
US9667657B2 (en) 2015-08-04 2017-05-30 AO Kaspersky Lab System and method of utilizing a dedicated computer security service
US10547540B2 (en) 2015-08-29 2020-01-28 Vmware, Inc. Routing optimization for inter-cloud connectivity
US10067780B2 (en) 2015-10-06 2018-09-04 Cisco Technology, Inc. Performance-based public cloud selection for a hybrid cloud environment
US10462136B2 (en) 2015-10-13 2019-10-29 Cisco Technology, Inc. Hybrid cloud security groups
US9804988B1 (en) 2015-10-30 2017-10-31 Amazon Technologies, Inc. Device full memory access through standard PCI express bus
US20170126583A1 (en) 2015-11-03 2017-05-04 Le Holdings (Beijing) Co., Ltd. Method and electronic device for bandwidth allocation based on online media services
US9912614B2 (en) 2015-12-07 2018-03-06 Brocade Communications Systems LLC Interconnection of switches based on hierarchical overlay tunneling
US10142293B2 (en) 2015-12-15 2018-11-27 International Business Machines Corporation Dynamically defined virtual private network tunnels in hybrid cloud environments
CN105740084B (en) 2016-01-27 2018-08-24 北京航空航天大学 Consider the cloud computing system Reliability Modeling of common cause fault
US11245593B2 (en) 2016-04-25 2022-02-08 Vmware, Inc. Frequency-domain analysis of data-center operational and performance metrics
US10237187B2 (en) 2016-04-29 2019-03-19 Citrix Systems, Inc. System and method for service chain load balancing
US10129177B2 (en) 2016-05-23 2018-11-13 Cisco Technology, Inc. Inter-cloud broker for hybrid cloud networks
EP3291120B1 (en) 2016-09-06 2021-04-21 Accenture Global Solutions Limited Graph database analysis for network anomaly detection systems
US10409367B2 (en) 2016-12-21 2019-09-10 Ca, Inc. Predictive graph selection
US10346762B2 (en) 2016-12-21 2019-07-09 Ca, Inc. Collaborative data analytics application

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130232491A1 (en) * 2008-06-13 2013-09-05 Netapp Inc. Virtual machine communication
US20110261828A1 (en) * 2010-04-27 2011-10-27 Cisco Technology, Inc. Virtual switching overlay for cloud computing
US20130232492A1 (en) * 2010-10-19 2013-09-05 Zte Corporation Method and system for realizing virtual machine mobility
US20130268643A1 (en) * 2012-04-05 2013-10-10 Cisco Technology, Inc. System and method for migrating application virtual machines in a network environment
US8909780B1 (en) * 2012-05-24 2014-12-09 Amazon Technologies, Inc. Connection following during network reconfiguration
US20150063102A1 (en) * 2013-08-30 2015-03-05 Cisco Technology, Inc. Flow Based Network Service Insertion
US20160188527A1 (en) * 2014-12-29 2016-06-30 Vmware, Inc. Methods and systems to achieve multi-tenancy in rdma over converged ethernet
US20170054659A1 (en) * 2015-08-20 2017-02-23 Intel Corporation Techniques for routing packets between virtual machines

Cited By (184)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10212074B2 (en) 2011-06-24 2019-02-19 Cisco Technology, Inc. Level of hierarchy in MST for traffic localization and load balancing
US10257042B2 (en) 2012-01-13 2019-04-09 Cisco Technology, Inc. System and method for managing site-to-site VPNs of a cloud managed network
US10454984B2 (en) 2013-03-14 2019-10-22 Cisco Technology, Inc. Method for streaming packet captures from network access devices to a cloud server over HTTP
US10461959B2 (en) 2014-04-15 2019-10-29 Cisco Technology, Inc. Programmable infrastructure gateway for enabling hybrid cloud services in a network environment
US10972312B2 (en) 2014-04-15 2021-04-06 Cisco Technology, Inc. Programmable infrastructure gateway for enabling hybrid cloud services in a network environment
US11606226B2 (en) 2014-04-15 2023-03-14 Cisco Technology, Inc. Programmable infrastructure gateway for enabling hybrid cloud services in a network environment
US9935894B2 (en) 2014-05-08 2018-04-03 Cisco Technology, Inc. Collaborative inter-service scheduling of logical resources in cloud platforms
US10148565B2 (en) * 2014-06-03 2018-12-04 Huawei Technologies Co., Ltd. OPENFLOW communication method and system, controller, and service gateway
US20170085473A1 (en) * 2014-06-03 2017-03-23 Huawei Technologies Co., Ltd. OPENFLOW Communication Method and System, Controller, and Service Gateway
US10122605B2 (en) 2014-07-09 2018-11-06 Cisco Technology, Inc Annotation of network activity through different phases of execution
US10805235B2 (en) 2014-09-26 2020-10-13 Cisco Technology, Inc. Distributed application framework for prioritizing network traffic using application priority awareness
US10050862B2 (en) 2015-02-09 2018-08-14 Cisco Technology, Inc. Distributed application framework that uses network and application awareness for placing data
US10825212B2 (en) 2015-02-27 2020-11-03 Cisco Technology, Inc. Enhanced user interface systems including dynamic context selection for cloud-based networks
US10708342B2 (en) 2015-02-27 2020-07-07 Cisco Technology, Inc. Dynamic troubleshooting workspaces for cloud and network management systems
US10037617B2 (en) 2015-02-27 2018-07-31 Cisco Technology, Inc. Enhanced user interface systems including dynamic context selection for cloud-based networks
US10382534B1 (en) 2015-04-04 2019-08-13 Cisco Technology, Inc. Selective load balancing of network traffic
US11122114B2 (en) 2015-04-04 2021-09-14 Cisco Technology, Inc. Selective load balancing of network traffic
US11843658B2 (en) 2015-04-04 2023-12-12 Cisco Technology, Inc. Selective load balancing of network traffic
US10938937B2 (en) 2015-05-15 2021-03-02 Cisco Technology, Inc. Multi-datacenter message queue
US10476982B2 (en) 2015-05-15 2019-11-12 Cisco Technology, Inc. Multi-datacenter message queue
US10034201B2 (en) 2015-07-09 2018-07-24 Cisco Technology, Inc. Stateless load-balancing across multiple tunnels
US10901769B2 (en) 2015-10-06 2021-01-26 Cisco Technology, Inc. Performance-based public cloud selection for a hybrid cloud environment
US10067780B2 (en) 2015-10-06 2018-09-04 Cisco Technology, Inc. Performance-based public cloud selection for a hybrid cloud environment
US12363115B2 (en) 2015-10-13 2025-07-15 Cisco Technology, Inc. Hybrid cloud security groups
US10462136B2 (en) 2015-10-13 2019-10-29 Cisco Technology, Inc. Hybrid cloud security groups
US11218483B2 (en) 2015-10-13 2022-01-04 Cisco Technology, Inc. Hybrid cloud security groups
US10523657B2 (en) 2015-11-16 2019-12-31 Cisco Technology, Inc. Endpoint privacy preservation with cloud conferencing
US10205677B2 (en) 2015-11-24 2019-02-12 Cisco Technology, Inc. Cloud resource placement optimization and migration execution in federated clouds
US10084703B2 (en) 2015-12-04 2018-09-25 Cisco Technology, Inc. Infrastructure-exclusive service forwarding
US20170171298A1 (en) * 2015-12-09 2017-06-15 Intel Corporation Enhanced virtual switch for network function virtualization
US10367914B2 (en) 2016-01-12 2019-07-30 Cisco Technology, Inc. Attaching service level agreements to application containers and enabling service assurance
US10999406B2 (en) 2016-01-12 2021-05-04 Cisco Technology, Inc. Attaching service level agreements to application containers and enabling service assurance
US11093271B2 (en) 2016-03-18 2021-08-17 Airwatch Llc Enforcing compliance rules using host management components
US11720393B2 (en) 2016-03-18 2023-08-08 Airwatch Llc Enforcing compliance rules using guest management components
US10129177B2 (en) 2016-05-23 2018-11-13 Cisco Technology, Inc. Inter-cloud broker for hybrid cloud networks
US20180007123A1 (en) * 2016-06-30 2018-01-04 Alibaba Group Holding Limited Express route transmissions between virtual machines and cloud service computing devices
US10432450B2 (en) * 2016-06-30 2019-10-01 Microsoft Technology Licensing, Llc. Data plane API in a distributed computing network
US10404788B2 (en) * 2016-06-30 2019-09-03 Alibaba Group Holding Limited Express route transmissions between virtual machines and cloud service computing devices
US10659283B2 (en) 2016-07-08 2020-05-19 Cisco Technology, Inc. Reducing ARP/ND flooding in cloud environment
US10608865B2 (en) 2016-07-08 2020-03-31 Cisco Technology, Inc. Reducing ARP/ND flooding in cloud environment
US10432532B2 (en) 2016-07-12 2019-10-01 Cisco Technology, Inc. Dynamically pinning micro-service to uplink port
US10382597B2 (en) 2016-07-20 2019-08-13 Cisco Technology, Inc. System and method for transport-layer level identification and isolation of container traffic
US10263898B2 (en) 2016-07-20 2019-04-16 Cisco Technology, Inc. System and method for implementing universal cloud classification (UCC) as a service (UCCaaS)
US10419330B2 (en) 2016-07-21 2019-09-17 Alibaba Group Holding Limited Express route transmissions between virtual machines and cloud service computing devices
US10142346B2 (en) 2016-07-28 2018-11-27 Cisco Technology, Inc. Extension of a private cloud end-point group to a public cloud
US10567344B2 (en) 2016-08-23 2020-02-18 Cisco Technology, Inc. Automatic firewall configuration based on aggregated cloud managed information
US10812413B2 (en) 2016-08-27 2020-10-20 Nicira, Inc. Logical network domains stretched between public and private datacenters
US10484302B2 (en) * 2016-08-27 2019-11-19 Nicira, Inc. Managed forwarding element executing in public cloud data compute node with different internal and external network addresses
US10924431B2 (en) 2016-08-27 2021-02-16 Nicira, Inc. Distributed processing of north-south traffic for logical network in public cloud
US10367757B2 (en) 2016-08-27 2019-07-30 Nicira, Inc. Extension of network control system into public cloud
US11792138B2 (en) 2016-08-27 2023-10-17 Nicira, Inc. Centralized processing of north-south traffic for logical network in public cloud
US11018993B2 (en) 2016-08-27 2021-05-25 Nicira, Inc. Distributed network encryption for logical network implemented in public cloud
US12489681B2 (en) 2016-08-27 2025-12-02 VMware LLC Extension of network control system into public cloud
US10397136B2 (en) 2016-08-27 2019-08-27 Nicira, Inc. Managed forwarding element executing in separate namespace of public cloud data compute node than workload application
US11012507B2 (en) * 2016-08-29 2021-05-18 Vmware, Inc. High throughput layer 2 extension leveraging CPU flow affinity
US10805330B2 (en) 2016-08-31 2020-10-13 Nicira, Inc. Identifying and handling threats to data compute nodes in public cloud
US10341371B2 (en) 2016-08-31 2019-07-02 Nicira, Inc. Identifying and handling threats to data compute nodes in public cloud
US11050586B2 (en) * 2016-09-26 2021-06-29 Huawei Technologies Co., Ltd. Inter-cloud communication method and related device, and inter-cloud communication configuration method and related device
US12335117B2 (en) * 2016-09-28 2025-06-17 Amazon Technologies, Inc. Visualization of network health information
US12432163B2 (en) 2016-10-10 2025-09-30 Cisco Technology, Inc. Orchestration system for migrating user data and services based on user information
US10523592B2 (en) 2016-10-10 2019-12-31 Cisco Technology, Inc. Orchestration system for migrating user data and services based on user information
US11716288B2 (en) 2016-10-10 2023-08-01 Cisco Technology, Inc. Orchestration system for migrating user data and services based on user information
US11044162B2 (en) 2016-12-06 2021-06-22 Cisco Technology, Inc. Orchestration of cloud and fog interactions
US10326817B2 (en) 2016-12-20 2019-06-18 Cisco Technology, Inc. System and method for quality-aware recording in large scale collaborate clouds
US10334029B2 (en) 2017-01-10 2019-06-25 Cisco Technology, Inc. Forming neighborhood groups from disperse cloud providers
US10552191B2 (en) 2017-01-26 2020-02-04 Cisco Technology, Inc. Distributed hybrid cloud orchestration model
US10917351B2 (en) 2017-01-30 2021-02-09 Cisco Technology, Inc. Reliable load-balancer using segment routing and real-time application monitoring
US10320683B2 (en) 2017-01-30 2019-06-11 Cisco Technology, Inc. Reliable load-balancer using segment routing and real-time application monitoring
US10671571B2 (en) 2017-01-31 2020-06-02 Cisco Technology, Inc. Fast network performance in containerized environments for network function virtualization
US10523512B2 (en) * 2017-03-24 2019-12-31 Cisco Technology, Inc. Network agent for generating platform specific network policies
US20180278478A1 (en) * 2017-03-24 2018-09-27 Cisco Technology, Inc. Network Agent For Generating Platform Specific Network Policies
US11252038B2 (en) 2017-03-24 2022-02-15 Cisco Technology, Inc. Network agent for generating platform specific network policies
US11349802B2 (en) * 2017-04-04 2022-05-31 Samsung Electronics Co., Ltd. Device and method for setting transmission rules of data packet in software defined network
US11005731B2 (en) 2017-04-05 2021-05-11 Cisco Technology, Inc. Estimating model parameters for automatic deployment of scalable micro services
US10715597B2 (en) 2017-06-16 2020-07-14 At&T Intellectual Property I, L.P. Methods and systems to create a network-agnostic SDN-based cloud gateway for connectivity to multiple cloud service providers
US10382274B2 (en) 2017-06-26 2019-08-13 Cisco Technology, Inc. System and method for wide area zero-configuration network auto configuration
US10439877B2 (en) 2017-06-26 2019-10-08 Cisco Technology, Inc. Systems and methods for enabling wide area multicast domain name system
CN107547258A (en) * 2017-07-18 2018-01-05 新华三云计算技术有限公司 The implementation method and device of a kind of network strategy
US11411799B2 (en) 2017-07-21 2022-08-09 Cisco Technology, Inc. Scalable statistics and analytics mechanisms in cloud networking
US11695640B2 (en) 2017-07-21 2023-07-04 Cisco Technology, Inc. Container telemetry in data center environments with blade servers and switches
US11196632B2 (en) 2017-07-21 2021-12-07 Cisco Technology, Inc. Container telemetry in data center environments with blade servers and switches
US10425288B2 (en) 2017-07-21 2019-09-24 Cisco Technology, Inc. Container telemetry in data center environments with blade servers and switches
US10892940B2 (en) 2017-07-21 2021-01-12 Cisco Technology, Inc. Scalable statistics and analytics mechanisms in cloud networking
US10601693B2 (en) 2017-07-24 2020-03-24 Cisco Technology, Inc. System and method for providing scalable flow monitoring in a data center fabric
US11233721B2 (en) 2017-07-24 2022-01-25 Cisco Technology, Inc. System and method for providing scalable flow monitoring in a data center fabric
US11159412B2 (en) 2017-07-24 2021-10-26 Cisco Technology, Inc. System and method for providing scalable flow monitoring in a data center fabric
US12184486B2 (en) 2017-07-25 2024-12-31 Cisco Technology, Inc. Detecting and resolving multicast traffic performance issues
US10541866B2 (en) 2017-07-25 2020-01-21 Cisco Technology, Inc. Detecting and resolving multicast traffic performance issues
US11102065B2 (en) 2017-07-25 2021-08-24 Cisco Technology, Inc. Detecting and resolving multicast traffic performance issues
US11115465B2 (en) 2017-08-24 2021-09-07 Nicira, Inc. Accessing endpoints in logical networks and public cloud service providers native networks using a single network interface and a single routing table
US10567482B2 (en) 2017-08-24 2020-02-18 Nicira, Inc. Accessing endpoints in logical networks and public cloud service providers native networks using a single network interface and a single routing table
US10491516B2 (en) 2017-08-24 2019-11-26 Nicira, Inc. Packet communication between logical networks and public cloud service providers native networks using a single network interface and a single routing table
US11695697B2 (en) 2017-08-27 2023-07-04 Nicira, Inc. Performing in-line service in public cloud
US12470623B2 (en) * 2017-08-31 2025-11-11 Oracle International Corporation System and method for supporting heterogeneous and asymmetric dual rail fabric configurations in a high performance computing environment
US20220263892A1 (en) * 2017-08-31 2022-08-18 Oracle International Corporation System and method for supporting heterogeneous and asymmetric dual rail fabric configurations in a high performance computing environment
US10353800B2 (en) 2017-10-18 2019-07-16 Cisco Technology, Inc. System and method for graph based monitoring and management of distributed systems
US10866879B2 (en) 2017-10-18 2020-12-15 Cisco Technology, Inc. System and method for graph based monitoring and management of distributed systems
US12197396B2 (en) 2017-11-13 2025-01-14 Cisco Technology, Inc. Using persistent memory to enable restartability of bulk load transactions in cloud databases
US11481362B2 (en) 2017-11-13 2022-10-25 Cisco Technology, Inc. Using persistent memory to enable restartability of bulk load transactions in cloud databases
US10862753B2 (en) 2017-12-04 2020-12-08 Nicira, Inc. High availability for stateful services in public cloud logical networks
US10601705B2 (en) 2017-12-04 2020-03-24 Nicira, Inc. Failover of centralized routers in public cloud logical networks
US10705882B2 (en) 2017-12-21 2020-07-07 Cisco Technology, Inc. System and method for resource placement across clouds for data intensive workloads
US11595474B2 (en) 2017-12-28 2023-02-28 Cisco Technology, Inc. Accelerating data replication using multicast and non-volatile memory enabled nodes
US20190222574A1 (en) * 2018-01-17 2019-07-18 Vmware, Inc. Automating establishment of initial mutual trust during deployment of a virtual appliance in a managed virtual data center environment
US10728243B2 (en) * 2018-01-17 2020-07-28 Vmware, Inc. Automating establishment of initial mutual trust during deployment of a virtual appliance in a managed virtual data center environment
US10979416B2 (en) * 2018-03-26 2021-04-13 Nicira, Inc. System and method for authentication in a public cloud
US20190297072A1 (en) * 2018-03-26 2019-09-26 Nicira, Inc. System and method for authentication in a public cloud
US10511534B2 (en) 2018-04-06 2019-12-17 Cisco Technology, Inc. Stateless distributed load-balancing
US11233737B2 (en) 2018-04-06 2022-01-25 Cisco Technology, Inc. Stateless distributed load-balancing
US10887350B2 (en) * 2018-04-09 2021-01-05 Nicira, Inc. Method and system for applying compliance policies on private and public cloud
US20190312909A1 (en) * 2018-04-09 2019-10-10 Nicira, Inc. Method and system for applying compliance policies on private and public cloud
US11063903B2 (en) * 2018-04-11 2021-07-13 Vmware, Inc. Port and loopback IP addresses allocation scheme for full-mesh communications with transparent TLS tunnels
US20220070139A1 (en) * 2018-04-11 2022-03-03 Vmware, Inc. Port and loopback ip addresses allocation scheme for full-mesh communications with transparent tls tunnels
US11936613B2 (en) * 2018-04-11 2024-03-19 Vmware, Inc. Port and loopback IP addresses allocation scheme for full-mesh communications with transparent TLS tunnels
US10728361B2 (en) 2018-05-29 2020-07-28 Cisco Technology, Inc. System for association of customer information across subscribers
US11252256B2 (en) 2018-05-29 2022-02-15 Cisco Technology, Inc. System for association of customer information across subscribers
US10904322B2 (en) 2018-06-15 2021-01-26 Cisco Technology, Inc. Systems and methods for scaling down cloud-based servers handling secure connections
US11968198B2 (en) 2018-06-19 2024-04-23 Cisco Technology, Inc. Distributed authentication and authorization for rapid scaling of containerized services
US10764266B2 (en) 2018-06-19 2020-09-01 Cisco Technology, Inc. Distributed authentication and authorization for rapid scaling of containerized services
US11552937B2 (en) 2018-06-19 2023-01-10 Cisco Technology, Inc. Distributed authentication and authorization for rapid scaling of containerized services
US11019083B2 (en) 2018-06-20 2021-05-25 Cisco Technology, Inc. System for coordinating distributed website analysis
US11343229B2 (en) 2018-06-28 2022-05-24 Vmware, Inc. Managed forwarding element detecting invalid packet addresses
US10819571B2 (en) 2018-06-29 2020-10-27 Cisco Technology, Inc. Network traffic optimization using in-situ notification system
US10904342B2 (en) 2018-07-30 2021-01-26 Cisco Technology, Inc. Container networking using communication tunnels
EP3836487A4 (en) * 2018-08-07 2022-06-29 Sangfor Technologies Inc. Internet access behavior management system, device and method
US11082399B2 (en) * 2018-08-10 2021-08-03 Microsoft Technology Licensing, Llc Virtual switch bypass
US20200053050A1 (en) * 2018-08-10 2020-02-13 Microsoft Technology Licensing, Llc Virtual switch bypass
US11374794B2 (en) * 2018-08-24 2022-06-28 Vmware, Inc. Transitive routing in public cloud
US12074731B2 (en) 2018-08-24 2024-08-27 VMware LLC Transitive routing in public cloud
US11196591B2 (en) 2018-08-24 2021-12-07 Vmware, Inc. Centralized overlay gateway in public cloud
US10491466B1 (en) 2018-08-24 2019-11-26 Vmware, Inc. Intelligent use of peering in public cloud
US20200067733A1 (en) * 2018-08-24 2020-02-27 Vmware, Inc. Transitive routing in public cloud
US12375449B2 (en) 2018-09-21 2025-07-29 Google Llc Virtual private cloud network switching
US12010097B2 (en) * 2018-09-21 2024-06-11 Google Llc Network architecture for cloud computing environments
US20220174042A1 (en) * 2018-09-21 2022-06-02 Google Llc Network Architecture for Cloud Computing Environments
US12238076B2 (en) * 2018-10-02 2025-02-25 Arista Networks, Inc. In-line encryption of network data
US20210092103A1 (en) * 2018-10-02 2021-03-25 Arista Networks, Inc. In-line encryption of network data
US10785029B2 (en) * 2018-10-31 2020-09-22 Nutanix, Inc. Systems and methods for pairing on-premise clusters to clouds using identity service providers
CN111130975A (en) * 2018-11-01 2020-05-08 深信服科技股份有限公司 Hybrid cloud network intercommunication system and method
CN111124659A (en) * 2018-11-01 2020-05-08 深信服科技股份有限公司 Heterogeneous cloud network intercommunication system and method
CN111130974A (en) * 2018-11-01 2020-05-08 深信服科技股份有限公司 Network intercommunication system and method based on multi-cloud environment
CN111225071A (en) * 2018-11-23 2020-06-02 深信服科技股份有限公司 Cloud platform and cross-cloud platform network intercommunication system and method
US10958720B2 (en) 2018-12-18 2021-03-23 Storage Engine, Inc. Methods, apparatuses and systems for cloud based disaster recovery
US11489730B2 (en) 2018-12-18 2022-11-01 Storage Engine, Inc. Methods, apparatuses and systems for configuring a network environment for a server
US11178221B2 (en) 2018-12-18 2021-11-16 Storage Engine, Inc. Methods, apparatuses and systems for cloud-based disaster recovery
US10983886B2 (en) 2018-12-18 2021-04-20 Storage Engine, Inc. Methods, apparatuses and systems for cloud-based disaster recovery
US11176002B2 (en) 2018-12-18 2021-11-16 Storage Engine, Inc. Methods, apparatuses and systems for cloud-based disaster recovery
US10887382B2 (en) 2018-12-18 2021-01-05 Storage Engine, Inc. Methods, apparatuses and systems for cloud-based disaster recovery
US11252019B2 (en) 2018-12-18 2022-02-15 Storage Engine, Inc. Methods, apparatuses and systems for cloud-based disaster recovery
US10963283B2 (en) * 2018-12-27 2021-03-30 Nutanix, Inc. Configuration management for hybrid cloud
CN111385180A (en) * 2018-12-28 2020-07-07 中国移动通信集团重庆有限公司 Communication tunnel construction method, device, equipment and medium
US11102114B2 (en) 2018-12-28 2021-08-24 Alibaba Group Holding Limited Method, apparatus, and computer-readable storage medium for network optimization for accessing cloud service from on-premises network
WO2020135221A1 (en) * 2018-12-28 2020-07-02 Alibaba Group Holding Limited Method, apparatus, and computer-readable storage medium for network optimization for accessing cloud service from on-premises network
US20200252234A1 (en) * 2019-01-31 2020-08-06 Juniper Networks, Inc. Policy-driven on-demand tunnel creation/deletion based on traffic information in a wide area network (wan)
US11336482B2 (en) * 2019-01-31 2022-05-17 Juniper Networks, Inc. Policy-driven on-demand tunnel creation/deletion based on traffic information in a wide area network (WAN)
US11128490B2 (en) 2019-04-26 2021-09-21 Microsoft Technology Licensing, Llc Enabling access to dedicated resources in a virtual network using top of rack switches
US11057350B2 (en) * 2019-05-30 2021-07-06 Cisco Technology, Inc. Layer 2 mobility for hybrid multi-cloud deployments without host-overlay
CN114175583A (en) * 2019-07-29 2022-03-11 思科技术公司 System resource management in self-healing networks
US11563601B1 (en) 2019-08-22 2023-01-24 Juniper Networks, Inc. Proactive tunnel configuration computation for on-demand SD-WAN tunnels
US12289182B1 (en) 2019-08-22 2025-04-29 Juniper Networks, Inc. Proactive tunnel configuration computation for on-demand SD-WAN tunnels
CN110636115A (en) * 2019-08-29 2019-12-31 平安医疗健康管理股份有限公司 Cross-cloud service calling processing method, gateway server and requester server
US11652693B2 (en) * 2019-09-04 2023-05-16 Telefonaktiebolaget Lm Ericsson (Publ) Edge cloud anchoring
US20220294698A1 (en) * 2019-09-04 2022-09-15 Telefonaktiebolaget Lm Ericsson (Publ) Edge Cloud Anchoring
US12231389B2 (en) 2019-09-06 2025-02-18 Huawei Cloud Computing Technologies Co., Ltd. Communication method, gateway, and management method and apparatus in hybrid cloud environment
WO2021043314A1 (en) * 2019-09-06 2021-03-11 华为技术有限公司 Communication method for hybrid cloud environment, gateway, and management method and apparatus
US11888809B2 (en) 2019-09-06 2024-01-30 Huawei Technologies Co., Ltd. Communication method, gateway, and management method and apparatus in hybrid cloud environment
CN111049925A (en) * 2019-12-20 2020-04-21 网易(杭州)网络有限公司 Hybrid cloud network system, communication system and communication method
CN111404801A (en) * 2020-03-27 2020-07-10 四川虹美智能科技有限公司 Data processing method, device and system for cross-cloud manufacturer
US11310117B2 (en) 2020-06-24 2022-04-19 Red Hat, Inc. Pairing of a probe entity with another entity in a cloud computing environment
US12445838B2 (en) * 2020-06-28 2025-10-14 Zte Corporation 5G authentication method, 5G account opening method and system, and electronic device and computer-readable storage medium
US20230300612A1 (en) * 2020-06-28 2023-09-21 Zte Corporation 5g authentication method, 5g account opening method and system, and electronic device and computer-readable storage medium
US11159419B1 (en) 2021-01-29 2021-10-26 Netskope, Inc. Policy-driven data locality and residency
US12413627B2 (en) 2021-03-23 2025-09-09 Oracle International Corporation Policy engine for governing cloud environments
US12034773B2 (en) 2021-03-23 2024-07-09 Oracle International Corporation Policy engine for governing cloud environments
CN113595846A (en) * 2021-07-20 2021-11-02 重庆长安汽车股份有限公司 Method for realizing communication of GRE tunnel in cloud-to-cloud environment
US12363035B2 (en) 2021-09-29 2025-07-15 Juniper Networks, Inc. Opportunistic mesh for software-defined wide area network (SD-WAN)
US20230117052A1 (en) * 2021-10-19 2023-04-20 Yokogawa Electric Corporation Control system, control method, and non-transitory computer readable storage medium
EP4170981A1 (en) * 2021-10-19 2023-04-26 Yokogawa Electric Corporation Control system, control method, and non-transitory computer readable storage medium
CN114500171A (en) * 2021-12-29 2022-05-13 曙光云计算集团有限公司 Network system and message transmission method
US11930045B1 (en) * 2023-04-28 2024-03-12 Snowflake Inc. Secure network access from sandboxed applications
US12323468B2 (en) * 2023-04-28 2025-06-03 Snowflake Inc. Secure execution of user-defined functions
US20240414210A1 (en) * 2023-06-09 2024-12-12 Fortinet, Inc. Systems and methods for edge processing using selectively suspended network security
US20250097148A1 (en) * 2023-09-19 2025-03-20 Cisco Technology, Inc. Service routing using ip encapsulation
US12348634B1 (en) * 2023-12-27 2025-07-01 University Of Sharjah Framework for storage and verification of academic credentials on blockchain technology

Also Published As

Publication number Publication date
US11005682B2 (en) 2021-05-11

Similar Documents

Publication Publication Date Title
US11005682B2 (en) Policy-driven switch overlay bypass in a hybrid cloud network environment
US12363115B2 (en) Hybrid cloud security groups
EP3611883B1 (en) Secure forwarding of tenant workloads in virtual networks
US11625154B2 (en) Stage upgrade of image versions on devices in a cluster
US10680831B2 (en) Single point of management for multi-cloud environment including route propagation, security, and application deployment
US9397946B1 (en) Forwarding to clusters of service nodes
US10116559B2 (en) Operations, administration and management (OAM) in overlay data center environments
CN110838992B (en) System and method for transferring packets between kernel modules in different network stacks
US20180027009A1 (en) Automated container security
US20170317901A1 (en) Integrated approach to monitor gbp health and adjust policy service level
US11838376B2 (en) Scaling service discovery in a micro-service environment
US20180006969A1 (en) Technique for gleaning mac and ip address bindings
US10230543B2 (en) Reducing data transmissions in a virtual private network
US9825814B2 (en) Dynamic attribute based application policy
EP4535758A1 (en) Dynamic site selection in global server load balancing (gslb) environment

Legal Events

Date Code Title Description
AS Assignment

Owner name: CISCO TECHNOLOGY, INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:CHANG, DAVID W.;PATRA, ABHIJIT;BAGEPALLI, NAGARAJ A.;AND OTHERS;SIGNING DATES FROM 20151005 TO 20151006;REEL/FRAME:036740/0741

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS

STPP Information on status: patent application and granting procedure in general

Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED

STCF Information on status: patent grant

Free format text: PATENTED CASE

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 4